0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{0x1, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000240)='%-5lx \x00'}, 0x20) semget$private(0x0, 0x3, 0x240) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000180)='./file0\x00', r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x9, 0x8, 0x3f, 0x280c, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3, 0xe}, 0x48) r2 = syz_open_dev$loop(&(0x7f00000000c0), 0x5, 0x204000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@o_path={&(0x7f0000000000)='./file0\x00', r1, 0x4000, r2}, 0x18) syz_open_dev$loop(&(0x7f0000000140), 0x80dc, 0x0) 02:36:25 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{0x1, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000240)='%-5lx \x00'}, 0x20) semget$private(0x0, 0x3, 0x240) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000180)='./file0\x00', r0}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000180)='./file0\x00', r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x9, 0x8, 0x3f, 0x280c, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3, 0xe}, 0x48) syz_open_dev$loop(&(0x7f00000000c0), 0x5, 0x204000) (async) r2 = syz_open_dev$loop(&(0x7f00000000c0), 0x5, 0x204000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@o_path={&(0x7f0000000000)='./file0\x00', r1, 0x4000, r2}, 0x18) syz_open_dev$loop(&(0x7f0000000140), 0x80dc, 0x0) 02:36:25 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{0x1, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000240)='%-5lx \x00'}, 0x20) semget$private(0x0, 0x3, 0x240) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000180)='./file0\x00', r0}, 0x18) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x9, 0x8, 0x3f, 0x280c, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3, 0xe}, 0x48) (rerun: 64) r2 = syz_open_dev$loop(&(0x7f00000000c0), 0x5, 0x204000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@o_path={&(0x7f0000000000)='./file0\x00', r1, 0x4000, r2}, 0x18) (async) syz_open_dev$loop(&(0x7f0000000140), 0x80dc, 0x0) 02:36:26 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x9, 0x1, 0x0, 0x80, r0, 0x0, '\x00', 0x0, r1, 0x2, 0x2, 0x4, 0x4}, 0x48) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000240)={@mcast2, 0x0}, &(0x7f0000000280)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x80, 0x80, 0x5, [@union={0xa, 0x4, 0x0, 0x5, 0x0, 0x3, [{0x6, 0x0, 0x5}, {0xf, 0x3, 0x10}, {0x4, 0x4, 0xffffffc1}, {0x9, 0x1, 0x8}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x80}}, @enum={0xd, 0x4, 0x0, 0x6, 0x4, [{0xd, 0x4}, {0x8, 0xffffffe1}, {0xf, 0x8}, {0x6, 0x3}]}]}, {0x0, [0x51, 0x5f, 0x5f]}}, &(0x7f0000000380)=""/73, 0x9d, 0x49, 0x1, 0x5}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc3c00000, 0x0, 0x0, 0x0, 0x401}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f00000007c0)='syzkaller\x00', 0x8001, 0x22, &(0x7f0000000800)=""/34, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, &(0x7f0000000840)=[{0x5, 0x2, 0x4, 0x6}, {0x3, 0x9, 0xffffff81, 0xd}, {0x2, 0x1, 0x9, 0xb}, {0x0, 0x5, 0xc, 0x3}, {0x4, 0x2, 0x6, 0x8}], 0x10, 0x9}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000980)={0xffffffffffffffff, 0x8, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x3, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0xb}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x10001, 0x78, &(0x7f0000000140)=""/120, 0x41000, 0x9, '\x00', r3, 0x29, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x2, 0xd, 0x7fff, 0x2}, 0x10, r5, r6, 0x1, &(0x7f00000009c0)=[r2, r2, r0, r0, r0, r0, r2, r0, r0, r7], &(0x7f0000000a00)=[{0x5, 0x4, 0xf, 0x3}], 0x10, 0x3}, 0x90) 02:36:29 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) (rerun: 32) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x9, 0x1, 0x0, 0x80, r0, 0x0, '\x00', 0x0, r1, 0x2, 0x2, 0x4, 0x4}, 0x48) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000240)={@mcast2, 0x0}, &(0x7f0000000280)=0x14) (async) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x80, 0x80, 0x5, [@union={0xa, 0x4, 0x0, 0x5, 0x0, 0x3, [{0x6, 0x0, 0x5}, {0xf, 0x3, 0x10}, {0x4, 0x4, 0xffffffc1}, {0x9, 0x1, 0x8}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x80}}, @enum={0xd, 0x4, 0x0, 0x6, 0x4, [{0xd, 0x4}, {0x8, 0xffffffe1}, {0xf, 0x8}, {0x6, 0x3}]}]}, {0x0, [0x51, 0x5f, 0x5f]}}, &(0x7f0000000380)=""/73, 0x9d, 0x49, 0x1, 0x5}, 0x20) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) (rerun: 32) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc3c00000, 0x0, 0x0, 0x0, 0x401}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f00000007c0)='syzkaller\x00', 0x8001, 0x22, &(0x7f0000000800)=""/34, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, &(0x7f0000000840)=[{0x5, 0x2, 0x4, 0x6}, {0x3, 0x9, 0xffffff81, 0xd}, {0x2, 0x1, 0x9, 0xb}, {0x0, 0x5, 0xc, 0x3}, {0x4, 0x2, 0x6, 0x8}], 0x10, 0x9}, 0x90) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000980)={0xffffffffffffffff, 0x8, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x3, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0xb}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x10001, 0x78, &(0x7f0000000140)=""/120, 0x41000, 0x9, '\x00', r3, 0x29, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x2, 0xd, 0x7fff, 0x2}, 0x10, r5, r6, 0x1, &(0x7f00000009c0)=[r2, r2, r0, r0, r0, r0, r2, r0, r0, r7], &(0x7f0000000a00)=[{0x5, 0x4, 0xf, 0x3}], 0x10, 0x3}, 0x90) 02:36:29 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x85, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000540)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000580)='syzkaller\x00', 0x5, 0xed, &(0x7f00000006c0)=""/237, 0x40f00, 0x68, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x1, 0x7, 0x8, 0x8}, 0x10, 0x565d, 0xffffffffffffffff, 0x2, &(0x7f0000000600)=[r0, r0, r0, 0x1, 0xffffffffffffffff], &(0x7f0000000640)=[{0x0, 0x2, 0x1, 0x5}, {0x0, 0x5, 0xe, 0xb}], 0x10, 0xf7}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffff}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x5d, &(0x7f00000000c0)=""/93, 0x41000, 0x11, '\x00', r1, 0x2b, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x7, 0x5, 0x1}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f00000007c0)=[r0, r0, r0], 0x0, 0x10, 0x1}, 0x90) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a00)={0x1b, 0x0, 0x0, 0x40d, 0x0, 0x1, 0x7639, '\x00', r1, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000f00)=0x0) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r5, 0xc0c89425, &(0x7f0000000f40)={"1c6535d288a295ad8795e70da9e3a9bc", 0x0, 0x0, {0x6, 0x80000001}, {0x8, 0x6}, 0x3, [0x8, 0xfffffffffffffffe, 0x7ff, 0x20, 0x92, 0xfc10, 0xffffffff, 0x2, 0x1f, 0xef, 0x9, 0x4, 0x7, 0x5, 0xffffffff, 0x7]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f00000019c0)={"d841537bee280c3ea752043842f965b9", r6, r7, {0x2, 0x3}, {0x6, 0x8e12b34}, 0x8000, [0x4, 0x2, 0x1, 0x3, 0xffffffff, 0x8, 0x8, 0xfff, 0xf8, 0x9e, 0x8000000000000001, 0x8000000000000000, 0x6, 0x5, 0xf8]}) r8 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendto$l2tp6(r8, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={r4, r8}, 0xc) getpeername$l2tp6(r8, &(0x7f0000001140)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000ec0)=0x20) r9 = openat$dlm_plock(0xffffff9c, &(0x7f0000000c40), 0x1, 0x0) (async, rerun: 32) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000d00)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x5}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0xb, 0x18, &(0x7f0000000a80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@exit, @jmp={0x5, 0x1, 0x1, 0xa, 0xa, 0xffffffffffffffe0}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='GPL\x00', 0x6, 0xf7, &(0x7f0000000b40)=""/247, 0x41000, 0x10, '\x00', r1, 0x23, r9, 0x8, &(0x7f0000000c80)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000cc0)={0x5, 0xc, 0xd525, 0x1b}, 0x10, r2, 0xffffffffffffffff, 0x3, &(0x7f0000000d80)=[r10], &(0x7f0000000dc0)=[{0x4, 0x4, 0xc, 0x1}, {0x2, 0x3, 0x6, 0xb}, {0x3, 0x4, 0x1, 0x7}], 0x10, 0xfffffffe}, 0x90) (async) r11 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r11, 0xc008640a, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000011ac0)={@cgroup=r11, 0x3, 0x0, 0x0, &(0x7f0000001080)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000010c0)=[0x0, 0x0], &(0x7f0000001100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r12}, 0x18) (async, rerun: 32) linkat(r9, &(0x7f0000001ac0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r9, &(0x7f0000001040)='./file0\x00', 0x200) (rerun: 32) r13 = syz_usb_connect$uac1(0x0, 0xf5, &(0x7f0000001180)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0xff, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xe3, 0x3, 0x1, 0x8, 0x50, 0x81, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x3, 0x8}, [@selector_unit={0xa, 0x24, 0x5, 0x2, 0x0, "6a76c8a5ff"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xd, 0x24, 0x2, 0x2, 0x40, 0x1, 0x61, "f6d9afd0"}, @format_type_i_discrete={0x10, 0x24, 0x2, 0x1, 0x3f, 0x3, 0x1, 0x4, "414b37a738120ee9"}, @format_type_i_discrete={0xc, 0x24, 0x2, 0x1, 0x2, 0x4, 0x3, 0x5, "f2136d15"}, @format_type_i_discrete={0x9, 0x24, 0x2, 0x1, 0x7a, 0x2, 0x2, 0x3, '*'}, @as_header={0x7, 0x24, 0x1, 0x5, 0x5, 0x6}, @format_type_ii_discrete={0xa, 0x24, 0x2, 0x2, 0x1, 0x1, 0x0, '\f'}]}, {{0x9, 0x5, 0x1, 0x9, 0x40, 0x45, 0x80, 0x4, {0x7, 0x25, 0x1, 0x82, 0x8, 0x6}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xd, 0x24, 0x2, 0x2, 0x0, 0x8, 0xe1, "40733dcb"}, @format_type_i_discrete={0xd, 0x24, 0x2, 0x1, 0x6, 0x1, 0x3, 0x0, "ebc2694c9c"}, @format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x5, 0x832, 0x80}, @format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x0, 0x0, 0xe8}, @format_type_ii_discrete={0xb, 0x24, 0x2, 0x2, 0xffff, 0x4, 0x3, "fe09"}]}, {{0x9, 0x5, 0x82, 0x9, 0x400, 0x0, 0x80, 0x9, {0x7, 0x25, 0x1, 0x80, 0x5c, 0x200}}}}}}}]}}, &(0x7f00000014c0)={0xa, &(0x7f0000001280)={0xa, 0x6, 0x250, 0x99, 0x5, 0x3, 0x10, 0x20}, 0x29, &(0x7f00000012c0)={0x5, 0xf, 0x29, 0x1, [@ssp_cap={0x24, 0x10, 0xa, 0x39, 0x6, 0x9, 0xf, 0xffff, [0xcf, 0xff0030, 0x7e60, 0x0, 0x3f00, 0xff0000]}]}, 0x3, [{0x4, &(0x7f0000001300)=@lang_id={0x4, 0x3, 0x400a}}, {0x90, &(0x7f0000001340)=@string={0x90, 0x3, "fac1fd660354a1cd52a6b063e7d00a749352a727070e1886ee6e9e3938afd0d22768587bac6353444a524dcee4119e34d223a6d5060da1831150787e8af5a72a799db5786ea1b30c373bcf9cabdb15c27bc2dec29d681a73abf422a46c6175d185bea52c99914e7f41ad3a1ac5591d0bc5d6b9c54436a148246786b2d7f8d37ae9490026438cb26ba7ac4acc3271"}}, {0xaa, &(0x7f0000001400)=@string={0xaa, 0x3, "21b7f1a12641049184ea6c0d092ae12ca883ed845f0a1d812fe469cd7864978a450e2cc7df602cfee1dd4e3498c6180f64d6c456d6a90335a53469c77c28a41a0c21b1602c9f27da547fc3c5b62752a9c233d05c742646e01fbb7c1c2edb895758331b2b0ea6ef62d07710d4c9634fc60bafa2ed4bb64933a80201c2a5f0ab0b0ee41f436524aa082feb55ac2030eb0bf7f7194841fa43383ccc259ce093d2126e0b24c55333f1a7"}}]}) syz_usb_control_io$uac1(r13, &(0x7f0000001640)={0xc, &(0x7f0000001500)={0x0, 0x5, 0xca, {0xca, 0x5, "49a91a66c7b910f243a197b36877b737aae91f175d3065f70481a467f867500d66d6ad11fd2de4c3af14c1c472f4c83e07cde58ffab1a197cde314549bf4398c6deed4929e1d1a92e79d671b8f0f9e7d9459a480f41debbcb4d25a023bcbd27ae976eec9775a865883d640f4334994c893c4c4312ae5bc675908394624dfa9bdad8b04e3cf65a320f2c65b09e8db0a06cbb9a4cb7c959b7f91d52dd0b5190abe52e16598982e5e3384f1cb4fc543b0173fa075827178a66eb12447fa5907ef87f8681debd5121d4c"}}, &(0x7f00000018c0)={0x0, 0x3, 0x22, @string={0xf7, 0x3, "19da9e08b45eb26904576c061c0892d597a089bc37a8d57a55a9902603590c17bfc2ad4fa601b8b2a087a7a56f6625a41473c48214184d2f539689339baa9f565fac4959aa1b1f42d3e08925ce4605f75d6f3fdb5f4773871c8720ead25581a26d645a21b0cf8a08e4aa019dfa505daeab9280b68005ee2dcf8ce6aca53103b533a83d78cdb5c0ec9d4d8d21b8173262390477cc5c0c47c441b14cb8e4fbe8d1f4281ae4b8040d0db786d335918574f93be53dbb902e35fa39e8e2a32c2067545be4c2da2f5fdbf996e1a0147ed33af9673d8f46e9f2d64e06272fed1ed8d041ed4f0e0c7a9c8d23fa119e9dc16627a6b8e039e56d"}}}, &(0x7f0000001880)={0x24, &(0x7f0000001680)={0x40, 0xa, 0x5, "1f12bdcb80"}, &(0x7f00000016c0)={0x0, 0xa, 0x1, 0x27}, &(0x7f0000001700)={0x0, 0x8, 0x1, 0x1f}, &(0x7f0000001740)={0x20, 0x81, 0x3, "a2de83"}, &(0x7f0000001780)={0x20, 0x82, 0x3, "43e868"}, &(0x7f00000017c0)={0x20, 0x83, 0x1, '\\'}, &(0x7f0000001600)={0x20, 0x84, 0x4, "a3df657b"}, &(0x7f0000001840)={0x20, 0x85, 0xfffffffffffffeeb, '6<~'}}) 02:36:29 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x9, 0x1, 0x0, 0x80, r0, 0x0, '\x00', 0x0, r1, 0x2, 0x2, 0x4, 0x4}, 0x48) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000240)={@mcast2, 0x0}, &(0x7f0000000280)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x80, 0x80, 0x5, [@union={0xa, 0x4, 0x0, 0x5, 0x0, 0x3, [{0x6, 0x0, 0x5}, {0xf, 0x3, 0x10}, {0x4, 0x4, 0xffffffc1}, {0x9, 0x1, 0x8}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x80}}, @enum={0xd, 0x4, 0x0, 0x6, 0x4, [{0xd, 0x4}, {0x8, 0xffffffe1}, {0xf, 0x8}, {0x6, 0x3}]}]}, {0x0, [0x51, 0x5f, 0x5f]}}, &(0x7f0000000380)=""/73, 0x9d, 0x49, 0x1, 0x5}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc3c00000, 0x0, 0x0, 0x0, 0x401}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f00000007c0)='syzkaller\x00', 0x8001, 0x22, &(0x7f0000000800)=""/34, 0x40f00, 0x28, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, &(0x7f0000000840)=[{0x5, 0x2, 0x4, 0x6}, {0x3, 0x9, 0xffffff81, 0xd}, {0x2, 0x1, 0x9, 0xb}, {0x0, 0x5, 0xc, 0x3}, {0x4, 0x2, 0x6, 0x8}], 0x10, 0x9}, 0x90) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000980)={0xffffffffffffffff, 0x8, 0x8}, 0xc) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000980)={0xffffffffffffffff, 0x8, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x3, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0xb}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x10001, 0x78, &(0x7f0000000140)=""/120, 0x41000, 0x9, '\x00', r3, 0x29, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x2, 0xd, 0x7fff, 0x2}, 0x10, r5, r6, 0x1, &(0x7f00000009c0)=[r2, r2, r0, r0, r0, r0, r2, r0, r0, r7], &(0x7f0000000a00)=[{0x5, 0x4, 0xf, 0x3}], 0x10, 0x3}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x3, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0xb}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x10001, 0x78, &(0x7f0000000140)=""/120, 0x41000, 0x9, '\x00', r3, 0x29, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x2, 0xd, 0x7fff, 0x2}, 0x10, r5, r6, 0x1, &(0x7f00000009c0)=[r2, r2, r0, r0, r0, r0, r2, r0, r0, r7], &(0x7f0000000a00)=[{0x5, 0x4, 0xf, 0x3}], 0x10, 0x3}, 0x90) 02:36:30 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000680)) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000580), &(0x7f0000000600)=0x58, 0x80000) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x40}, 0xc) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x5f, 0x5f, 0x30, 0x3e, 0x0, 0x0]}}, &(0x7f0000000240)=""/246, 0x20, 0xf6, 0x1, 0x10f}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000180), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1f, 0x3ff, 0x38, 0x7, 0x100a, r1, 0x401, '\x00', r3, r2, 0x1, 0x1, 0x8}, 0x48) 02:36:31 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000680)) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000580), &(0x7f0000000600)=0x58, 0x80000) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x40}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x5f, 0x5f, 0x30, 0x3e, 0x0, 0x0]}}, &(0x7f0000000240)=""/246, 0x20, 0xf6, 0x1, 0x10f}, 0x20) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x5f, 0x5f, 0x30, 0x3e, 0x0, 0x0]}}, &(0x7f0000000240)=""/246, 0x20, 0xf6, 0x1, 0x10f}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000180), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1f, 0x3ff, 0x38, 0x7, 0x100a, r1, 0x401, '\x00', r3, r2, 0x1, 0x1, 0x8}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1f, 0x3ff, 0x38, 0x7, 0x100a, r1, 0x401, '\x00', r3, r2, 0x1, 0x1, 0x8}, 0x48) 02:36:31 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000680)) (async) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000580), &(0x7f0000000600)=0x58, 0x80000) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x40}, 0xc) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x5f, 0x5f, 0x30, 0x3e, 0x0, 0x0]}}, &(0x7f0000000240)=""/246, 0x20, 0xf6, 0x1, 0x10f}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000180), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1f, 0x3ff, 0x38, 0x7, 0x100a, r1, 0x401, '\x00', r3, r2, 0x1, 0x1, 0x8}, 0x48) 02:36:31 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x85, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000540)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000580)='syzkaller\x00', 0x5, 0xed, &(0x7f00000006c0)=""/237, 0x40f00, 0x68, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x1, 0x7, 0x8, 0x8}, 0x10, 0x565d, 0xffffffffffffffff, 0x2, &(0x7f0000000600)=[r0, r0, r0, 0x1, 0xffffffffffffffff], &(0x7f0000000640)=[{0x0, 0x2, 0x1, 0x5}, {0x0, 0x5, 0xe, 0xb}], 0x10, 0xf7}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffff}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x5d, &(0x7f00000000c0)=""/93, 0x41000, 0x11, '\x00', r1, 0x2b, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x7, 0x5, 0x1}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f00000007c0)=[r0, r0, r0], 0x0, 0x10, 0x1}, 0x90) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a00)={0x1b, 0x0, 0x0, 0x40d, 0x0, 0x1, 0x7639, '\x00', r1, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) (async) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f0000000f00)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r5, 0xc0c89425, &(0x7f0000000f40)={"1c6535d288a295ad8795e70da9e3a9bc", 0x0, 0x0, {0x6, 0x80000001}, {0x8, 0x6}, 0x3, [0x8, 0xfffffffffffffffe, 0x7ff, 0x20, 0x92, 0xfc10, 0xffffffff, 0x2, 0x1f, 0xef, 0x9, 0x4, 0x7, 0x5, 0xffffffff, 0x7]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f00000019c0)={"d841537bee280c3ea752043842f965b9", r6, r7, {0x2, 0x3}, {0x6, 0x8e12b34}, 0x8000, [0x4, 0x2, 0x1, 0x3, 0xffffffff, 0x8, 0x8, 0xfff, 0xf8, 0x9e, 0x8000000000000001, 0x8000000000000000, 0x6, 0x5, 0xf8]}) r8 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendto$l2tp6(r8, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={r4, r8}, 0xc) (async) getpeername$l2tp6(r8, &(0x7f0000001140)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000ec0)=0x20) (async) r9 = openat$dlm_plock(0xffffff9c, &(0x7f0000000c40), 0x1, 0x0) (async) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000d00)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0xb, 0x18, &(0x7f0000000a80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@exit, @jmp={0x5, 0x1, 0x1, 0xa, 0xa, 0xffffffffffffffe0}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000800)='GPL\x00', 0x6, 0xf7, &(0x7f0000000b40)=""/247, 0x41000, 0x10, '\x00', r1, 0x23, r9, 0x8, &(0x7f0000000c80)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000cc0)={0x5, 0xc, 0xd525, 0x1b}, 0x10, r2, 0xffffffffffffffff, 0x3, &(0x7f0000000d80)=[r10], &(0x7f0000000dc0)=[{0x4, 0x4, 0xc, 0x1}, {0x2, 0x3, 0x6, 0xb}, {0x3, 0x4, 0x1, 0x7}], 0x10, 0xfffffffe}, 0x90) (async) r11 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r11, 0xc008640a, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000011ac0)={@cgroup=r11, 0x3, 0x0, 0x0, &(0x7f0000001080)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000010c0)=[0x0, 0x0], &(0x7f0000001100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r12}, 0x18) (async) linkat(r9, &(0x7f0000001ac0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r9, &(0x7f0000001040)='./file0\x00', 0x200) r13 = syz_usb_connect$uac1(0x0, 0xf5, &(0x7f0000001180)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0xff, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xe3, 0x3, 0x1, 0x8, 0x50, 0x81, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x3, 0x8}, [@selector_unit={0xa, 0x24, 0x5, 0x2, 0x0, "6a76c8a5ff"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xd, 0x24, 0x2, 0x2, 0x40, 0x1, 0x61, "f6d9afd0"}, @format_type_i_discrete={0x10, 0x24, 0x2, 0x1, 0x3f, 0x3, 0x1, 0x4, "414b37a738120ee9"}, @format_type_i_discrete={0xc, 0x24, 0x2, 0x1, 0x2, 0x4, 0x3, 0x5, "f2136d15"}, @format_type_i_discrete={0x9, 0x24, 0x2, 0x1, 0x7a, 0x2, 0x2, 0x3, '*'}, @as_header={0x7, 0x24, 0x1, 0x5, 0x5, 0x6}, @format_type_ii_discrete={0xa, 0x24, 0x2, 0x2, 0x1, 0x1, 0x0, '\f'}]}, {{0x9, 0x5, 0x1, 0x9, 0x40, 0x45, 0x80, 0x4, {0x7, 0x25, 0x1, 0x82, 0x8, 0x6}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xd, 0x24, 0x2, 0x2, 0x0, 0x8, 0xe1, "40733dcb"}, @format_type_i_discrete={0xd, 0x24, 0x2, 0x1, 0x6, 0x1, 0x3, 0x0, "ebc2694c9c"}, @format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x5, 0x832, 0x80}, @format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x0, 0x0, 0xe8}, @format_type_ii_discrete={0xb, 0x24, 0x2, 0x2, 0xffff, 0x4, 0x3, "fe09"}]}, {{0x9, 0x5, 0x82, 0x9, 0x400, 0x0, 0x80, 0x9, {0x7, 0x25, 0x1, 0x80, 0x5c, 0x200}}}}}}}]}}, &(0x7f00000014c0)={0xa, &(0x7f0000001280)={0xa, 0x6, 0x250, 0x99, 0x5, 0x3, 0x10, 0x20}, 0x29, &(0x7f00000012c0)={0x5, 0xf, 0x29, 0x1, [@ssp_cap={0x24, 0x10, 0xa, 0x39, 0x6, 0x9, 0xf, 0xffff, [0xcf, 0xff0030, 0x7e60, 0x0, 0x3f00, 0xff0000]}]}, 0x3, [{0x4, &(0x7f0000001300)=@lang_id={0x4, 0x3, 0x400a}}, {0x90, &(0x7f0000001340)=@string={0x90, 0x3, "fac1fd660354a1cd52a6b063e7d00a749352a727070e1886ee6e9e3938afd0d22768587bac6353444a524dcee4119e34d223a6d5060da1831150787e8af5a72a799db5786ea1b30c373bcf9cabdb15c27bc2dec29d681a73abf422a46c6175d185bea52c99914e7f41ad3a1ac5591d0bc5d6b9c54436a148246786b2d7f8d37ae9490026438cb26ba7ac4acc3271"}}, {0xaa, &(0x7f0000001400)=@string={0xaa, 0x3, "21b7f1a12641049184ea6c0d092ae12ca883ed845f0a1d812fe469cd7864978a450e2cc7df602cfee1dd4e3498c6180f64d6c456d6a90335a53469c77c28a41a0c21b1602c9f27da547fc3c5b62752a9c233d05c742646e01fbb7c1c2edb895758331b2b0ea6ef62d07710d4c9634fc60bafa2ed4bb64933a80201c2a5f0ab0b0ee41f436524aa082feb55ac2030eb0bf7f7194841fa43383ccc259ce093d2126e0b24c55333f1a7"}}]}) syz_usb_control_io$uac1(r13, &(0x7f0000001640)={0xc, &(0x7f0000001500)={0x0, 0x5, 0xca, {0xca, 0x5, "49a91a66c7b910f243a197b36877b737aae91f175d3065f70481a467f867500d66d6ad11fd2de4c3af14c1c472f4c83e07cde58ffab1a197cde314549bf4398c6deed4929e1d1a92e79d671b8f0f9e7d9459a480f41debbcb4d25a023bcbd27ae976eec9775a865883d640f4334994c893c4c4312ae5bc675908394624dfa9bdad8b04e3cf65a320f2c65b09e8db0a06cbb9a4cb7c959b7f91d52dd0b5190abe52e16598982e5e3384f1cb4fc543b0173fa075827178a66eb12447fa5907ef87f8681debd5121d4c"}}, &(0x7f00000018c0)={0x0, 0x3, 0x22, @string={0xf7, 0x3, "19da9e08b45eb26904576c061c0892d597a089bc37a8d57a55a9902603590c17bfc2ad4fa601b8b2a087a7a56f6625a41473c48214184d2f539689339baa9f565fac4959aa1b1f42d3e08925ce4605f75d6f3fdb5f4773871c8720ead25581a26d645a21b0cf8a08e4aa019dfa505daeab9280b68005ee2dcf8ce6aca53103b533a83d78cdb5c0ec9d4d8d21b8173262390477cc5c0c47c441b14cb8e4fbe8d1f4281ae4b8040d0db786d335918574f93be53dbb902e35fa39e8e2a32c2067545be4c2da2f5fdbf996e1a0147ed33af9673d8f46e9f2d64e06272fed1ed8d041ed4f0e0c7a9c8d23fa119e9dc16627a6b8e039e56d"}}}, &(0x7f0000001880)={0x24, &(0x7f0000001680)={0x40, 0xa, 0x5, "1f12bdcb80"}, &(0x7f00000016c0)={0x0, 0xa, 0x1, 0x27}, &(0x7f0000001700)={0x0, 0x8, 0x1, 0x1f}, &(0x7f0000001740)={0x20, 0x81, 0x3, "a2de83"}, &(0x7f0000001780)={0x20, 0x82, 0x3, "43e868"}, &(0x7f00000017c0)={0x20, 0x83, 0x1, '\\'}, &(0x7f0000001600)={0x20, 0x84, 0x4, "a3df657b"}, &(0x7f0000001840)={0x20, 0x85, 0xfffffffffffffeeb, '6<~'}}) 02:36:31 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x30140, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, 0x0) openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x8) openat$rdma_cm(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2, r0}, 0x38) 02:36:32 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x30140, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, 0x0) openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x8) (async) openat$rdma_cm(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2, r0}, 0x38) [ 9392.347972][T14573] usb 1-1: new high-speed USB device number 60 using dummy_hcd 02:36:32 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x30140, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, 0x0) openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x8) openat$rdma_cm(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$rdma_cm(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2, r0}, 0x38) [ 9392.555505][T14573] usb 1-1: device descriptor read/64, error -71 [ 9392.855543][T14573] usb 1-1: new high-speed USB device number 61 using dummy_hcd 02:36:32 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0x38) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000001280), 0x480d80, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001240)={&(0x7f0000000000)="894dec8ccd6b6361befc622ad2c06b0165f01658fd9ad189b06df694751cfd996f5f1ec0ccc08b87a23b04f291bce1da49dac27ba7e38158dec3aa9f8ed2ca01574ced97f3e1c0a658964353e2aca60a0793d7f04734d694185bf64fe24ba31c2e98cd9046caa350b3d80cd45ad0fcb0f970daa625dd284d7488d6c23a4e10c33b12d9f5b0a6", &(0x7f00000000c0)=""/71, &(0x7f0000000140)="429f5a1323cb56487417c09048dceed481ac499c259a5616450663e70766cf71f33624634c182809fca62b2cfaa98eafec999816956d16140f436041d3dac1572770e6cce69b00e3911a91922ab1dc57d6b8ffa0eb22a37ac7045912cba426a4313d1ef7869a7a0afe4d62421ee16616a6c9af95088db766bce59d55a82c35aab2352f21917f97fd8c71dedbf3dadedad5475d81b1aa1f8928", &(0x7f0000000240)="76da3400ed5536188f0f1365c7c408ea9e11d097200d9018cd355af247c5f42d54fba65114243c1b3f57aedb2a1c6af7d6465b00b4da51fd0e6e36426845bbc8fa417da26d28d4b557bf89b79268df841ba55b652a18f93c5c5f3506c935f0368c4f441a365894e858c37d27466d608c2c07d8915b86d98adf148bc4469633e34c4cbbdd19eed5e75c856ad0787f2ce79bd38cea738d6138e4247d9244fbee3a879ea056179ee93a85f34dd8c37476c9a581940588f9d41e63a72207f645d64145a68292c6ac7b356fa03624365986121041ab0420155275486660b1ed5cc94b89d7dec0eb3765449177d611aa6891621f7a8c7e424741ddb1aefa1589c874a19331dd97a042a9b8cbe6ed80dd986f8c5cb3543c712c7a5a3aec023ef3e55a3bc568ebab3a5069ba5e061565b9dd7c286e29d2ecec9eabc5692be47b478e7d28f438702dc11fdbb6ee24c733dc39cf6c36f0d6f3bf6ac14415767f56771def82bf1f97ed220cf342171fdbddea4a8dcff937eed3ec015aec34465a70080614b9226f5bba3d0290e11eb704d3f81d2a4c3e429b9e29bc0b037f2a15b19b1bd0e0bfa8a8e7bb703e5aa9becba36f6d4963c25e61dba52862244d5ee9fd7e5f2cbd7d201ad7a4e20df8eabaf0971fb6d61f1d337a033e1048a1cfc6b67c2a9a418e78dfb29f3a44789e8e716f5c581888c4f41886ca5a844efbb1a78be6540baa653de1d1b4ee29142779b2918c301b5a9f537088b34fa0e394da6f61b58537ab3a308357867a8f2300f4b5f7018b5627791c2c7e9275e9e57248166cd24b56322454a3d385221bbf3c44002970ed25697003d21346751fa08c600eaeef2aab6646476af1c349f582505328dc471b80078e9390b7b8fab324c077711122a3df78e2caa08803f8281d9944e321858c72feebff7d700f958fff9e5054f96d19b4e6248ebce508c6fd7263c309e1a8197ba0eb861a0ed2ffb4ac9abadec595d860a3d6b2077897333910bbe7ca862f6bdfec59c556b1755e7e6ced0c767e372d539a226bd91194f213f8a5273a972efc5781dd6204c9262c9c7c5cc30b03b45846531063956f9e6943bed3eeff7f4f5acbd450e6d1e659adc34877cf9cb988d2065d9f45d5024f60cbd553341193980e0c4abb7cdc87789bcc056c675466e55d55a1b150faed69c9db2e77e91e27173bdcb9519ee02116cd63f970eb3f16b33862c7fca2e069b4891ed86c724e8e8c879938c2f99ba762f0c350bd3d5567cf2c75bbcdf67e3cf108636d83c78dd6cbff1f07e60c9d8c75a1a3ee86c5285f69130a9bf2246fab322e7146edc31787d6a6e9201c1564b0a473874187d9436059c509fd600b1e0831def3f6c3b995bcafdf662f9d0da0db65988d254501423a8f3580980ec92011ef77ee608ba4114a7655579fd96506773a51fd1778d03dec324acc3841850aeb85966af6261a8fae7221a1a9156ec47014c6cb670b32d8fdfeaf8788527100a98a3cbbbb3331c033d93fa8267ad3c0d94060a96ca519eb8dbe324f9ac29b2e7bc2bc146b93ddd7b1bffee51a96c9d7c547ed18d6e01e75047c22e541f63270951040e18b73237dcb46cf93011a6d2b94b8556cb2b3dbd40314c433d46945512122f214c445733456f22654efd8fa7411b2daeed6b699345f222232435b8adf22af9060e03287ef984c8e7d7b9ec437b62051cffea7fb7206b2810d2f67870628f99af5d895b0b58a7cd9cd9890f0c2d602e403b36d35cbb85f8e5849fa3d95a3d38eb527692923c8c702346b988c392fa67f778db0df9e7e642a3b7b2d964a0f3d37c360da82b2e505adeab8bf5c93ddeb394305b105df2487d3c5775b1de75ca44dd7874fd6b90768dd9be04da823760709a9a9c7aab0f7612cd9cb9153e454cb53584f94e0b0198a16b42cfcc76454a85e39702e9fe08b090551f67e2b38752f8aacebc5df9dc45f47f73528c818ca42d388595b0fdd059e4d2c3346f06f7af5842abfe7c46e6c12200eee5045ccc9bceef8802b9ada19b348c7063fd3e7dedb8d0865bfd4c04b9afedb83e23cacf6f0128ad1cb719da2d1ae557a1d7f2dec3f3f2a3b71f68aff8e4bbacf29022f6918bdeab315eb1785b7f2959b8e0f2cb3df6652867bfa0c96b77e963f5597ca0a45777c3bec91888cdcd29e268f07386c5e18c66451c76774254d4a58919246ee82c5794a3a1de30bab0faa4ac3dd64c4bcde2f07be46c18f04ee036284fcf94cf432731d899210483de976a9a96dba13edf669344ed9f4264cb8cbb23098cb1ea6c96bd020d1cce264564ef5b207b3e9ea12555f8bbd4e53acabaf6764439b4c3cfaf1b81e9ddc9c73e6d04aa72871a306fe8fbb8b1b43b6444773a70607c9afda9ef1d0d8d2522d9e62bbd1897ec18f85d0598b5d024b991799635dcf16992fccf364e98435d93d6e8040d1b552d1bc36d19efdf5483de47265af70e74913e641abf1dd1745fa9fc4c12023157a24515c2c8230264a4109ab0ce16d960320de8ece3c081faf5a2eb8e9c2f1c935ba799ba657afc3db2ad41b5a4d3ceac7be59be2e166d60c3ce19f6327db2e097ba4089789e0ffbf0a85fe579a83b3b86b466a8bf929d3c8afe201e5c37fda01aa0ccdbaa59dc46ac5ad84b71550e36e39d609264831913ec5758508734f9497ba80956692a4552d2b7d2904e0f0e5145e59f232d1706656be2d62771220b844c9f409a1382408ed7a545790ec71df3ca9e79acafa856653b12a4e21e1204faeb5c950232ee85b089ecdd43528fb799eed369eebf41882b3e8d559f698fe188088cc8b978df29c822f9388466b6689ace1c1490bf2af90cd24edc319e98f66056c3086a6c6ad9a286b10dbfd2b07168e243e04054adaeca0064f552731221407ee2fb6c9734fcdce0fbf52d936da42e752baa8c25772321617efc8270d46bbb18b4fd98e8698763ebc35c65b002a7b40f01d3fe732bb4fa12765f517a14364a683a94ccfb460e974820b69eb49b8d946b25e54457e6466ece3936abe997e4166e4ffc7858c9d4e07b617da69be0c58c8f6a2aced0b4646335de63e23b99d2ecb60aa27d5234d64d26fbe6c42ad4a7087d9994720d300bd39f20e22ff0b8718baddd8c6f15e3f6305a615e5daed0439dc509025f6d030e577d6c5033924741bf4cd8bd7b431fcd4679923a004ed0f4242455c8c3ab30fdc7a5be6c1f54b05d910b7123131f7ab51450889223a4459ffd2a069ea75b3c43abf5b34f6f7aa439f02971c9b19ae00bb0169a7c8fb5d0e238d9adaeefd080b831b51d69756e6522f6ff32627b2a226d6c5e45f06132e0bcb5cffff5a88ac581cc5e8a871e86d41721d8615d0081a452ff3c1c216c33e7ab3a6b47c962090366bdf277d9a060a665c24ee4c08b9c06a92199a35490f92682acd4c70d2a8fc62a98ae9557af244dc05d47d0f3a36ddfaf540b95c3dc8a76d459a01cb36110ef71614b461943fc2775c1a84a743ecbe977b82d776b5384ffee54290e6ff1f32ff7e287b3b2e692a81abf45ce606c89b356e00e4ffc9f42a09987a5ebfbeb934a8439284fb9ac225a5440c364f0dc45ecbed56ceb387be672a32730851ed2bb76e0f027f46bb036a9408a5abf09d196e1edcd98d2f6a2ff323d27c3935f89f3220b493e6b39e51f9659ebc4a16627cefa49db2aeea2cf2bd6fff11314c221a6242f3fba3b778ffa28411278d86962136368077d6b4a5acef73cf965b9a1b1ad2f6e5263326e947e5428291c67b3609605df46b8e7a46c0d04d4daedf971e603bf280aa09525c56565e19a60d260f694162a155c0bfa08b1cc02d05e1acf67ce21dac1ca6be73ef1c1c03d9334e9aea81e87ba8102e5cedf89bce0e78d8fcc24115846f1642355eb69165da42587c8bac80f7343045a4dc75834aa29709d3020ed168bbe71313738158c4f9247694d206a97aa340f14e380ca62d2da57d7fd0c50bf5df54e1a293457fd5004bcf433b6b1a63b5286521a81794706945c1f77d4a4386a39e80688ea40f28aff810fa2a9c06885dc796b88b513bb7e408d641157ccc1ef99970df68089680b623627e29c5b397fc84d5e1cd599266b19177fc59e570f5dbaccdac4fe08e8666a2f6b3b91b8e084ede0c12365618d02d7cb5684e14f369564225c12d230fbd40d50749c09702b865090f658a6211ab199567beabb15e288a0e42a80dcc8eedb31bc1b500c212016ddecd71a269cfb2c845c97f3b10edc79315aa24574444b0bc4a7192bd3ce33f1e945f51c7b6d15ea25b150168fe560be089bb47f9a87b57c7a1d130b10d0422221824ebbae0d6e2d6c45a97a3d91cbe3f14d52110bf58c0a1d4e96a2e78408ecd561a29f2822ac275e74aee762ae942eee046de4c29b388cd5f4c8a82a2a8547b93687492983c89775fb6ca2ed2df990d495258ee20a547fe23069aafd16a22ddad213f46923b098908009e2587c4c607434fe94c61524802b22e816a78c24a72fb06edaf73c2fabf9c9b95e5e9d021ff026c5e1babe4c51a43df2257e2b2a618406f288e9d2210fe8cf711bc038b0e6c1c720f080e734938903b88f4e231c5ff3ea3ef87819c15494d36ec87f7a7484484c81566f4ec6189338bd2ef891549560d6c7af4a491f3904368d1cebfbd8d3860f0b5a815c0876bd85a8e42cb9fabdc902a4664b9c5714974a85e22cea920d8d08c03f7c6f4a026156f45199c54b4de5d61c329ac7d67398ac1bbab43fcafa51f8b68d083e80504ce53d69af7221d8334852343cf74662fc7325e99641b644b9eb6dc05eb5d35adedf498c0d84d82d9fe979a65945dd2fd6ba2e76fabd74987bf5fb474c6774b55584b4bf94ffb79fe6c64e7f0e0d1cb8dd4a99bcbadff65e903639591be9c62f2d086c621fc622de985cae7bf5753c8ddf084f4af13f1ac4f891fd721151dd844610b20d76f9b8783320e3f58aa7524daa09c956e65d81d72cceae3d01607f2c83000fff8160ff61640a70e7b8fd519de4e9bc9f7d2f27b8b8bde89adf461e2c8979d2978d168229647d67b17c9b0ea2cc387063fa0e429ba1f383802e397789d0b29a91034d016ffa6523e7dc789bcf5ff949a65f753e7da8871c9176e6d29a1ab1d7ee89e731b440461531fb1e29a5029cfbcc4e10302973e7c7ecbbf273c0800f7e35b9d963d7c707a71ccdcde240a08759861ed968c97bf2fa849ce54ffa7d6c5c15fa03a94af91e94236af88ed22a036c176e282da6a353ab111b4799f1ada6f2c3e74026b094177f62dce3803c2a9aab5a901957f774beeb918649f41fbe48b24d60946cf5960b856696c2ea6e054ff30a8ac35a2dac31b4a90aae287e6f921f70e30b05b0889ba8a679310c79f63d5f6d9d837fef8729eb2aa5044ff5dbd60f3acaa890abbfaa45d26c015607fcfb9492d03dfc44f0846ee899b02e97a684c7be87166e3685e0ecfc9af08d0c5c3e7b1a0c77d149bc7cbb9335a2912e071d274238b40b9f536f3767da961fd7d1a8cec3e962bbb8c44ba1978e0394e62baa81288649cdfa2c174d138913070b0b06f2aa204ce7f0e08846238b18d0449694d9f24b6a274da09824954c7258e8a798271155c5fefb43b0ab9d62ea49dab8686c1b8a8f0060eef588e70861aa9664d29089059e85df9c01d7dd18b03e5f1b7426b9de6847f6e0ed6444d66379cbd9ecbead0ad42ce8ea9153d2cd0a7740f3b90f8709416241f3fbb1c3b6266706c8084fda50da6995e7c2f4c38f40603982629f7f34bf62174b36a5e0a0e2922efd2a20017ae46c883dbc1d57244a859c", 0x4, r0}, 0x38) [ 9393.056016][T14573] usb 1-1: device descriptor read/64, error -71 02:36:33 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0x38) (async) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000001280), 0x480d80, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, 0x0) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001240)={&(0x7f0000000000)="894dec8ccd6b6361befc622ad2c06b0165f01658fd9ad189b06df694751cfd996f5f1ec0ccc08b87a23b04f291bce1da49dac27ba7e38158dec3aa9f8ed2ca01574ced97f3e1c0a658964353e2aca60a0793d7f04734d694185bf64fe24ba31c2e98cd9046caa350b3d80cd45ad0fcb0f970daa625dd284d7488d6c23a4e10c33b12d9f5b0a6", &(0x7f00000000c0)=""/71, &(0x7f0000000140)="429f5a1323cb56487417c09048dceed481ac499c259a5616450663e70766cf71f33624634c182809fca62b2cfaa98eafec999816956d16140f436041d3dac1572770e6cce69b00e3911a91922ab1dc57d6b8ffa0eb22a37ac7045912cba426a4313d1ef7869a7a0afe4d62421ee16616a6c9af95088db766bce59d55a82c35aab2352f21917f97fd8c71dedbf3dadedad5475d81b1aa1f8928", &(0x7f0000000240)="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", 0x4, r0}, 0x38) [ 9393.195579][T14573] usb usb1-port1: attempt power cycle 02:36:33 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0x38) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000001280), 0x480d80, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001240)={&(0x7f0000000000)="894dec8ccd6b6361befc622ad2c06b0165f01658fd9ad189b06df694751cfd996f5f1ec0ccc08b87a23b04f291bce1da49dac27ba7e38158dec3aa9f8ed2ca01574ced97f3e1c0a658964353e2aca60a0793d7f04734d694185bf64fe24ba31c2e98cd9046caa350b3d80cd45ad0fcb0f970daa625dd284d7488d6c23a4e10c33b12d9f5b0a6", &(0x7f00000000c0)=""/71, &(0x7f0000000140)="429f5a1323cb56487417c09048dceed481ac499c259a5616450663e70766cf71f33624634c182809fca62b2cfaa98eafec999816956d16140f436041d3dac1572770e6cce69b00e3911a91922ab1dc57d6b8ffa0eb22a37ac7045912cba426a4313d1ef7869a7a0afe4d62421ee16616a6c9af95088db766bce59d55a82c35aab2352f21917f97fd8c71dedbf3dadedad5475d81b1aa1f8928", &(0x7f0000000240)="76da3400ed5536188f0f1365c7c408ea9e11d097200d9018cd355af247c5f42d54fba65114243c1b3f57aedb2a1c6af7d6465b00b4da51fd0e6e36426845bbc8fa417da26d28d4b557bf89b79268df841ba55b652a18f93c5c5f3506c935f0368c4f441a365894e858c37d27466d608c2c07d8915b86d98adf148bc4469633e34c4cbbdd19eed5e75c856ad0787f2ce79bd38cea738d6138e4247d9244fbee3a879ea056179ee93a85f34dd8c37476c9a581940588f9d41e63a72207f645d64145a68292c6ac7b356fa03624365986121041ab0420155275486660b1ed5cc94b89d7dec0eb3765449177d611aa6891621f7a8c7e424741ddb1aefa1589c874a19331dd97a042a9b8cbe6ed80dd986f8c5cb3543c712c7a5a3aec023ef3e55a3bc568ebab3a5069ba5e061565b9dd7c286e29d2ecec9eabc5692be47b478e7d28f438702dc11fdbb6ee24c733dc39cf6c36f0d6f3bf6ac14415767f56771def82bf1f97ed220cf342171fdbddea4a8dcff937eed3ec015aec34465a70080614b9226f5bba3d0290e11eb704d3f81d2a4c3e429b9e29bc0b037f2a15b19b1bd0e0bfa8a8e7bb703e5aa9becba36f6d4963c25e61dba52862244d5ee9fd7e5f2cbd7d201ad7a4e20df8eabaf0971fb6d61f1d337a033e1048a1cfc6b67c2a9a418e78dfb29f3a44789e8e716f5c581888c4f41886ca5a844efbb1a78be6540baa653de1d1b4ee29142779b2918c301b5a9f537088b34fa0e394da6f61b58537ab3a308357867a8f2300f4b5f7018b5627791c2c7e9275e9e57248166cd24b56322454a3d385221bbf3c44002970ed25697003d21346751fa08c600eaeef2aab6646476af1c349f582505328dc471b80078e9390b7b8fab324c077711122a3df78e2caa08803f8281d9944e321858c72feebff7d700f958fff9e5054f96d19b4e6248ebce508c6fd7263c309e1a8197ba0eb861a0ed2ffb4ac9abadec595d860a3d6b2077897333910bbe7ca862f6bdfec59c556b1755e7e6ced0c767e372d539a226bd91194f213f8a5273a972efc5781dd6204c9262c9c7c5cc30b03b45846531063956f9e6943bed3eeff7f4f5acbd450e6d1e659adc34877cf9cb988d2065d9f45d5024f60cbd553341193980e0c4abb7cdc87789bcc056c675466e55d55a1b150faed69c9db2e77e91e27173bdcb9519ee02116cd63f970eb3f16b33862c7fca2e069b4891ed86c724e8e8c879938c2f99ba762f0c350bd3d5567cf2c75bbcdf67e3cf108636d83c78dd6cbff1f07e60c9d8c75a1a3ee86c5285f69130a9bf2246fab322e7146edc31787d6a6e9201c1564b0a473874187d9436059c509fd600b1e0831def3f6c3b995bcafdf662f9d0da0db65988d254501423a8f3580980ec92011ef77ee608ba4114a7655579fd96506773a51fd1778d03dec324acc3841850aeb85966af6261a8fae7221a1a9156ec47014c6cb670b32d8fdfeaf8788527100a98a3cbbbb3331c033d93fa8267ad3c0d94060a96ca519eb8dbe324f9ac29b2e7bc2bc146b93ddd7b1bffee51a96c9d7c547ed18d6e01e75047c22e541f63270951040e18b73237dcb46cf93011a6d2b94b8556cb2b3dbd40314c433d46945512122f214c445733456f22654efd8fa7411b2daeed6b699345f222232435b8adf22af9060e03287ef984c8e7d7b9ec437b62051cffea7fb7206b2810d2f67870628f99af5d895b0b58a7cd9cd9890f0c2d602e403b36d35cbb85f8e5849fa3d95a3d38eb527692923c8c702346b988c392fa67f778db0df9e7e642a3b7b2d964a0f3d37c360da82b2e505adeab8bf5c93ddeb394305b105df2487d3c5775b1de75ca44dd7874fd6b90768dd9be04da823760709a9a9c7aab0f7612cd9cb9153e454cb53584f94e0b0198a16b42cfcc76454a85e39702e9fe08b090551f67e2b38752f8aacebc5df9dc45f47f73528c818ca42d388595b0fdd059e4d2c3346f06f7af5842abfe7c46e6c12200eee5045ccc9bceef8802b9ada19b348c7063fd3e7dedb8d0865bfd4c04b9afedb83e23cacf6f0128ad1cb719da2d1ae557a1d7f2dec3f3f2a3b71f68aff8e4bbacf29022f6918bdeab315eb1785b7f2959b8e0f2cb3df6652867bfa0c96b77e963f5597ca0a45777c3bec91888cdcd29e268f07386c5e18c66451c76774254d4a58919246ee82c5794a3a1de30bab0faa4ac3dd64c4bcde2f07be46c18f04ee036284fcf94cf432731d899210483de976a9a96dba13edf669344ed9f4264cb8cbb23098cb1ea6c96bd020d1cce264564ef5b207b3e9ea12555f8bbd4e53acabaf6764439b4c3cfaf1b81e9ddc9c73e6d04aa72871a306fe8fbb8b1b43b6444773a70607c9afda9ef1d0d8d2522d9e62bbd1897ec18f85d0598b5d024b991799635dcf16992fccf364e98435d93d6e8040d1b552d1bc36d19efdf5483de47265af70e74913e641abf1dd1745fa9fc4c12023157a24515c2c8230264a4109ab0ce16d960320de8ece3c081faf5a2eb8e9c2f1c935ba799ba657afc3db2ad41b5a4d3ceac7be59be2e166d60c3ce19f6327db2e097ba4089789e0ffbf0a85fe579a83b3b86b466a8bf929d3c8afe201e5c37fda01aa0ccdbaa59dc46ac5ad84b71550e36e39d609264831913ec5758508734f9497ba80956692a4552d2b7d2904e0f0e5145e59f232d1706656be2d62771220b844c9f409a1382408ed7a545790ec71df3ca9e79acafa856653b12a4e21e1204faeb5c950232ee85b089ecdd43528fb799eed369eebf41882b3e8d559f698fe188088cc8b978df29c822f9388466b6689ace1c1490bf2af90cd24edc319e98f66056c3086a6c6ad9a286b10dbfd2b07168e243e04054adaeca0064f552731221407ee2fb6c9734fcdce0fbf52d936da42e752baa8c25772321617efc8270d46bbb18b4fd98e8698763ebc35c65b002a7b40f01d3fe732bb4fa12765f517a14364a683a94ccfb460e974820b69eb49b8d946b25e54457e6466ece3936abe997e4166e4ffc7858c9d4e07b617da69be0c58c8f6a2aced0b4646335de63e23b99d2ecb60aa27d5234d64d26fbe6c42ad4a7087d9994720d300bd39f20e22ff0b8718baddd8c6f15e3f6305a615e5daed0439dc509025f6d030e577d6c5033924741bf4cd8bd7b431fcd4679923a004ed0f4242455c8c3ab30fdc7a5be6c1f54b05d910b7123131f7ab51450889223a4459ffd2a069ea75b3c43abf5b34f6f7aa439f02971c9b19ae00bb0169a7c8fb5d0e238d9adaeefd080b831b51d69756e6522f6ff32627b2a226d6c5e45f06132e0bcb5cffff5a88ac581cc5e8a871e86d41721d8615d0081a452ff3c1c216c33e7ab3a6b47c962090366bdf277d9a060a665c24ee4c08b9c06a92199a35490f92682acd4c70d2a8fc62a98ae9557af244dc05d47d0f3a36ddfaf540b95c3dc8a76d459a01cb36110ef71614b461943fc2775c1a84a743ecbe977b82d776b5384ffee54290e6ff1f32ff7e287b3b2e692a81abf45ce606c89b356e00e4ffc9f42a09987a5ebfbeb934a8439284fb9ac225a5440c364f0dc45ecbed56ceb387be672a32730851ed2bb76e0f027f46bb036a9408a5abf09d196e1edcd98d2f6a2ff323d27c3935f89f3220b493e6b39e51f9659ebc4a16627cefa49db2aeea2cf2bd6fff11314c221a6242f3fba3b778ffa28411278d86962136368077d6b4a5acef73cf965b9a1b1ad2f6e5263326e947e5428291c67b3609605df46b8e7a46c0d04d4daedf971e603bf280aa09525c56565e19a60d260f694162a155c0bfa08b1cc02d05e1acf67ce21dac1ca6be73ef1c1c03d9334e9aea81e87ba8102e5cedf89bce0e78d8fcc24115846f1642355eb69165da42587c8bac80f7343045a4dc75834aa29709d3020ed168bbe71313738158c4f9247694d206a97aa340f14e380ca62d2da57d7fd0c50bf5df54e1a293457fd5004bcf433b6b1a63b5286521a81794706945c1f77d4a4386a39e80688ea40f28aff810fa2a9c06885dc796b88b513bb7e408d641157ccc1ef99970df68089680b623627e29c5b397fc84d5e1cd599266b19177fc59e570f5dbaccdac4fe08e8666a2f6b3b91b8e084ede0c12365618d02d7cb5684e14f369564225c12d230fbd40d50749c09702b865090f658a6211ab199567beabb15e288a0e42a80dcc8eedb31bc1b500c212016ddecd71a269cfb2c845c97f3b10edc79315aa24574444b0bc4a7192bd3ce33f1e945f51c7b6d15ea25b150168fe560be089bb47f9a87b57c7a1d130b10d0422221824ebbae0d6e2d6c45a97a3d91cbe3f14d52110bf58c0a1d4e96a2e78408ecd561a29f2822ac275e74aee762ae942eee046de4c29b388cd5f4c8a82a2a8547b93687492983c89775fb6ca2ed2df990d495258ee20a547fe23069aafd16a22ddad213f46923b098908009e2587c4c607434fe94c61524802b22e816a78c24a72fb06edaf73c2fabf9c9b95e5e9d021ff026c5e1babe4c51a43df2257e2b2a618406f288e9d2210fe8cf711bc038b0e6c1c720f080e734938903b88f4e231c5ff3ea3ef87819c15494d36ec87f7a7484484c81566f4ec6189338bd2ef891549560d6c7af4a491f3904368d1cebfbd8d3860f0b5a815c0876bd85a8e42cb9fabdc902a4664b9c5714974a85e22cea920d8d08c03f7c6f4a026156f45199c54b4de5d61c329ac7d67398ac1bbab43fcafa51f8b68d083e80504ce53d69af7221d8334852343cf74662fc7325e99641b644b9eb6dc05eb5d35adedf498c0d84d82d9fe979a65945dd2fd6ba2e76fabd74987bf5fb474c6774b55584b4bf94ffb79fe6c64e7f0e0d1cb8dd4a99bcbadff65e903639591be9c62f2d086c621fc622de985cae7bf5753c8ddf084f4af13f1ac4f891fd721151dd844610b20d76f9b8783320e3f58aa7524daa09c956e65d81d72cceae3d01607f2c83000fff8160ff61640a70e7b8fd519de4e9bc9f7d2f27b8b8bde89adf461e2c8979d2978d168229647d67b17c9b0ea2cc387063fa0e429ba1f383802e397789d0b29a91034d016ffa6523e7dc789bcf5ff949a65f753e7da8871c9176e6d29a1ab1d7ee89e731b440461531fb1e29a5029cfbcc4e10302973e7c7ecbbf273c0800f7e35b9d963d7c707a71ccdcde240a08759861ed968c97bf2fa849ce54ffa7d6c5c15fa03a94af91e94236af88ed22a036c176e282da6a353ab111b4799f1ada6f2c3e74026b094177f62dce3803c2a9aab5a901957f774beeb918649f41fbe48b24d60946cf5960b856696c2ea6e054ff30a8ac35a2dac31b4a90aae287e6f921f70e30b05b0889ba8a679310c79f63d5f6d9d837fef8729eb2aa5044ff5dbd60f3acaa890abbfaa45d26c015607fcfb9492d03dfc44f0846ee899b02e97a684c7be87166e3685e0ecfc9af08d0c5c3e7b1a0c77d149bc7cbb9335a2912e071d274238b40b9f536f3767da961fd7d1a8cec3e962bbb8c44ba1978e0394e62baa81288649cdfa2c174d138913070b0b06f2aa204ce7f0e08846238b18d0449694d9f24b6a274da09824954c7258e8a798271155c5fefb43b0ab9d62ea49dab8686c1b8a8f0060eef588e70861aa9664d29089059e85df9c01d7dd18b03e5f1b7426b9de6847f6e0ed6444d66379cbd9ecbead0ad42ce8ea9153d2cd0a7740f3b90f8709416241f3fbb1c3b6266706c8084fda50da6995e7c2f4c38f40603982629f7f34bf62174b36a5e0a0e2922efd2a20017ae46c883dbc1d57244a859c", 0x4, r0}, 0x38) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001240)={&(0x7f0000000000)="894dec8ccd6b6361befc622ad2c06b0165f01658fd9ad189b06df694751cfd996f5f1ec0ccc08b87a23b04f291bce1da49dac27ba7e38158dec3aa9f8ed2ca01574ced97f3e1c0a658964353e2aca60a0793d7f04734d694185bf64fe24ba31c2e98cd9046caa350b3d80cd45ad0fcb0f970daa625dd284d7488d6c23a4e10c33b12d9f5b0a6", &(0x7f00000000c0)=""/71, &(0x7f0000000140)="429f5a1323cb56487417c09048dceed481ac499c259a5616450663e70766cf71f33624634c182809fca62b2cfaa98eafec999816956d16140f436041d3dac1572770e6cce69b00e3911a91922ab1dc57d6b8ffa0eb22a37ac7045912cba426a4313d1ef7869a7a0afe4d62421ee16616a6c9af95088db766bce59d55a82c35aab2352f21917f97fd8c71dedbf3dadedad5475d81b1aa1f8928", &(0x7f0000000240)="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", 0x4, r0}, 0x38) 02:36:33 executing program 1: openat$rtc(0xffffff9c, &(0x7f0000000000), 0x10002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x38) [ 9393.645900][T14573] usb 1-1: new high-speed USB device number 62 using dummy_hcd [ 9393.748769][T14573] usb 1-1: device descriptor read/8, error -71 02:36:33 executing program 1: openat$rtc(0xffffff9c, &(0x7f0000000000), 0x10002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x38) [ 9394.046377][T14573] usb 1-1: new high-speed USB device number 63 using dummy_hcd [ 9394.137069][T14573] usb 1-1: device descriptor read/8, error -71 02:36:34 executing program 1: openat$rtc(0xffffff9c, &(0x7f0000000000), 0x10002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x38) [ 9394.256334][T14573] usb usb1-port1: unable to enumerate USB device 02:36:34 executing program 1: r0 = openat$random(0xffffff9c, &(0x7f0000000000), 0x60202, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x0, 0x6b, "04caebaa756a13471fbd40c227fd9249b4d2ca20a9cad0db598486b5489ad736d6f2df41ae221fa5507af36a21faf721f104abc5ee862c03603396cbdee748b0c01939a505eeefd605bb230fdbea08f8890b57865be10bfc54a692299040ca319094a128ae3ba1e5621877"}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) 02:36:34 executing program 1: r0 = openat$random(0xffffff9c, &(0x7f0000000000), 0x60202, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x0, 0x6b, "04caebaa756a13471fbd40c227fd9249b4d2ca20a9cad0db598486b5489ad736d6f2df41ae221fa5507af36a21faf721f104abc5ee862c03603396cbdee748b0c01939a505eeefd605bb230fdbea08f8890b57865be10bfc54a692299040ca319094a128ae3ba1e5621877"}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) openat$random(0xffffff9c, &(0x7f0000000000), 0x60202, 0x0) (async) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x0, 0x6b, "04caebaa756a13471fbd40c227fd9249b4d2ca20a9cad0db598486b5489ad736d6f2df41ae221fa5507af36a21faf721f104abc5ee862c03603396cbdee748b0c01939a505eeefd605bb230fdbea08f8890b57865be10bfc54a692299040ca319094a128ae3ba1e5621877"}) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) (async) 02:36:35 executing program 1: r0 = openat$random(0xffffff9c, &(0x7f0000000000), 0x60202, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x0, 0x6b, "04caebaa756a13471fbd40c227fd9249b4d2ca20a9cad0db598486b5489ad736d6f2df41ae221fa5507af36a21faf721f104abc5ee862c03603396cbdee748b0c01939a505eeefd605bb230fdbea08f8890b57865be10bfc54a692299040ca319094a128ae3ba1e5621877"}) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) 02:36:36 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x0) connect$nfc_llcp(r0, &(0x7f0000000700)={0x27, 0x0, 0x0, 0x1, 0x6, 0x6, "3f55a20f138e11c96580d1b4bdabec81cdc98e49e8ee0fb6028a234a011fceb334741746b8efda1b5cf89d6e88d6523008f981cd510147eff27c907139051e", 0x1c}, 0x58) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x20, 0x12, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@jmp={0x5, 0x1, 0x8, 0xa, 0x2, 0x4, 0xffffffffffffffff}, @ldst={0x0, 0x1, 0x4, 0x7, 0x1, 0x100, 0xfffffffffffffff2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x3f, 0x1, &(0x7f0000000100)=""/1, 0x41000, 0x0, '\x00', 0x0, 0x2a, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0xa, 0x9, 0x4bd}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f00000005c0)=[r2, 0xffffffffffffffff], &(0x7f0000000600)=[{0x3, 0x1, 0x10, 0x5}, {0x2, 0x2, 0x6, 0x2}, {0x1, 0x4, 0x4, 0x6}], 0x10, 0xac2}, 0x90) 02:36:37 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x0) (async) connect$nfc_llcp(r0, &(0x7f0000000700)={0x27, 0x0, 0x0, 0x1, 0x6, 0x6, "3f55a20f138e11c96580d1b4bdabec81cdc98e49e8ee0fb6028a234a011fceb334741746b8efda1b5cf89d6e88d6523008f981cd510147eff27c907139051e", 0x1c}, 0x58) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x20, 0x12, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@jmp={0x5, 0x1, 0x8, 0xa, 0x2, 0x4, 0xffffffffffffffff}, @ldst={0x0, 0x1, 0x4, 0x7, 0x1, 0x100, 0xfffffffffffffff2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x3f, 0x1, &(0x7f0000000100)=""/1, 0x41000, 0x0, '\x00', 0x0, 0x2a, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0xa, 0x9, 0x4bd}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f00000005c0)=[r2, 0xffffffffffffffff], &(0x7f0000000600)=[{0x3, 0x1, 0x10, 0x5}, {0x2, 0x2, 0x6, 0x2}, {0x1, 0x4, 0x4, 0x6}], 0x10, 0xac2}, 0x90) 02:36:37 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x0) (async, rerun: 64) connect$nfc_llcp(r0, &(0x7f0000000700)={0x27, 0x0, 0x0, 0x1, 0x6, 0x6, "3f55a20f138e11c96580d1b4bdabec81cdc98e49e8ee0fb6028a234a011fceb334741746b8efda1b5cf89d6e88d6523008f981cd510147eff27c907139051e", 0x1c}, 0x58) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x20, 0x12, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@jmp={0x5, 0x1, 0x8, 0xa, 0x2, 0x4, 0xffffffffffffffff}, @ldst={0x0, 0x1, 0x4, 0x7, 0x1, 0x100, 0xfffffffffffffff2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x3f, 0x1, &(0x7f0000000100)=""/1, 0x41000, 0x0, '\x00', 0x0, 0x2a, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0xa, 0x9, 0x4bd}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f00000005c0)=[r2, 0xffffffffffffffff], &(0x7f0000000600)=[{0x3, 0x1, 0x10, 0x5}, {0x2, 0x2, 0x6, 0x2}, {0x1, 0x4, 0x4, 0x6}], 0x10, 0xac2}, 0x90) 02:36:38 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffc0, 0x0, 0x0, 0x0, 0x5}, [@alu={0x7, 0x0, 0x4, 0x2, 0xb, 0xffffffffffffffc0, 0x4}, @cb_func={0x18, 0x10, 0x4, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000580)='syzkaller\x00', 0x2, 0x58, &(0x7f00000005c0)=""/88, 0x40f00, 0x14, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x0, 0x5, 0x40000000, 0x1c}, 0x10, 0x16ac2, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000000680)=[{0x4, 0x1, 0x2, 0x2}, {0x3, 0x2, 0x8, 0x9}, {0x0, 0x2, 0xf, 0x5}, {0x0, 0x4, 0xc, 0x6}, {0x3, 0x4, 0x6, 0x4}], 0x10, 0x2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20}, [@jmp={0x5, 0x0, 0x0, 0x1, 0x5, 0x6, 0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0x80000000, 0xa0, &(0x7f0000000080)=""/160, 0x40f00, 0x1, '\x00', 0x0, 0x36, r0, 0x8, &(0x7f0000000180)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xa, 0x3, 0x6}, 0x10, r1, r2, 0x9, 0x0, &(0x7f00000007c0)=[{0x3, 0x5, 0x8, 0x4}, {0x5, 0x2, 0x1, 0xb}, {0x4, 0x1, 0x1, 0x1}, {0x4, 0x2, 0x9, 0x2}, {0x1, 0x3, 0x2, 0x1b4b10397b13240a}, {0x5, 0x2, 0x1, 0x3}, {0x1, 0x3, 0xa, 0xc}, {0x5, 0x1, 0x6, 0xe}, {0x5, 0x4, 0x6}], 0x10, 0x5}, 0x90) 02:36:38 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffc0, 0x0, 0x0, 0x0, 0x5}, [@alu={0x7, 0x0, 0x4, 0x2, 0xb, 0xffffffffffffffc0, 0x4}, @cb_func={0x18, 0x10, 0x4, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000580)='syzkaller\x00', 0x2, 0x58, &(0x7f00000005c0)=""/88, 0x40f00, 0x14, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x0, 0x5, 0x40000000, 0x1c}, 0x10, 0x16ac2, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000000680)=[{0x4, 0x1, 0x2, 0x2}, {0x3, 0x2, 0x8, 0x9}, {0x0, 0x2, 0xf, 0x5}, {0x0, 0x4, 0xc, 0x6}, {0x3, 0x4, 0x6, 0x4}], 0x10, 0x2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20}, [@jmp={0x5, 0x0, 0x0, 0x1, 0x5, 0x6, 0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0x80000000, 0xa0, &(0x7f0000000080)=""/160, 0x40f00, 0x1, '\x00', 0x0, 0x36, r0, 0x8, &(0x7f0000000180)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xa, 0x3, 0x6}, 0x10, r1, r2, 0x9, 0x0, &(0x7f00000007c0)=[{0x3, 0x5, 0x8, 0x4}, {0x5, 0x2, 0x1, 0xb}, {0x4, 0x1, 0x1, 0x1}, {0x4, 0x2, 0x9, 0x2}, {0x1, 0x3, 0x2, 0x1b4b10397b13240a}, {0x5, 0x2, 0x1, 0x3}, {0x1, 0x3, 0xa, 0xc}, {0x5, 0x1, 0x6, 0xe}, {0x5, 0x4, 0x6}], 0x10, 0x5}, 0x90) 02:36:39 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) (async) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async, rerun: 32) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffc0, 0x0, 0x0, 0x0, 0x5}, [@alu={0x7, 0x0, 0x4, 0x2, 0xb, 0xffffffffffffffc0, 0x4}, @cb_func={0x18, 0x10, 0x4, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000580)='syzkaller\x00', 0x2, 0x58, &(0x7f00000005c0)=""/88, 0x40f00, 0x14, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x0, 0x5, 0x40000000, 0x1c}, 0x10, 0x16ac2, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000000680)=[{0x4, 0x1, 0x2, 0x2}, {0x3, 0x2, 0x8, 0x9}, {0x0, 0x2, 0xf, 0x5}, {0x0, 0x4, 0xc, 0x6}, {0x3, 0x4, 0x6, 0x4}], 0x10, 0x2}, 0x90) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20}, [@jmp={0x5, 0x0, 0x0, 0x1, 0x5, 0x6, 0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0x80000000, 0xa0, &(0x7f0000000080)=""/160, 0x40f00, 0x1, '\x00', 0x0, 0x36, r0, 0x8, &(0x7f0000000180)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xa, 0x3, 0x6}, 0x10, r1, r2, 0x9, 0x0, &(0x7f00000007c0)=[{0x3, 0x5, 0x8, 0x4}, {0x5, 0x2, 0x1, 0xb}, {0x4, 0x1, 0x1, 0x1}, {0x4, 0x2, 0x9, 0x2}, {0x1, 0x3, 0x2, 0x1b4b10397b13240a}, {0x5, 0x2, 0x1, 0x3}, {0x1, 0x3, 0xa, 0xc}, {0x5, 0x1, 0x6, 0xe}, {0x5, 0x4, 0x6}], 0x10, 0x5}, 0x90) 02:36:39 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@loopback, 0x0}, &(0x7f0000000100)=0x14) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x20, 0x13, 0xff, 0x7fffffff, 0x100, r0, 0x7fff, '\x00', r1, r2, 0x2, 0x1, 0x4}, 0x48) 02:36:39 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@loopback, 0x0}, &(0x7f0000000100)=0x14) (async, rerun: 32) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) (rerun: 32) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x20, 0x13, 0xff, 0x7fffffff, 0x100, r0, 0x7fff, '\x00', r1, r2, 0x2, 0x1, 0x4}, 0x48) 02:36:40 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@loopback, 0x0}, &(0x7f0000000100)=0x14) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, 0x0) (async) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x20, 0x13, 0xff, 0x7fffffff, 0x100, r0, 0x7fff, '\x00', r1, r2, 0x2, 0x1, 0x4}, 0x48) 02:36:40 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r0 = openat$userio(0xffffff9c, &(0x7f0000000000), 0x1c1002, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040)={0x1, 0x6}, 0x2) 02:36:40 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r0 = openat$userio(0xffffff9c, &(0x7f0000000000), 0x1c1002, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040)={0x1, 0x6}, 0x2) (async) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040)={0x1, 0x6}, 0x2) 02:36:41 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) (async) r0 = openat$userio(0xffffff9c, &(0x7f0000000000), 0x1c1002, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040)={0x1, 0x6}, 0x2) 02:36:41 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2}, 0x38) 02:36:41 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2}, 0x38) 02:36:42 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2}, 0x38) (async) 02:36:43 executing program 1: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x48) geteuid() r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x6, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$SMC_PNETID_FLUSH(r3, 0x0, 0x0) r4 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r5, 0x10, 0x0, @in={0x2, 0x0, @local}}}, 0x90) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000280), r5, r1}}, 0x18) sendmsg$L2TP_CMD_NOOP(r1, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, r0}, 0x38) 02:36:43 executing program 1: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x48) geteuid() (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x6, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) (async) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$SMC_PNETID_FLUSH(r3, 0x0, 0x0) (async) r4 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r5, 0x10, 0x0, @in={0x2, 0x0, @local}}}, 0x90) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000280), r5, r1}}, 0x18) sendmsg$L2TP_CMD_NOOP(r1, 0x0, 0x0) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, r0}, 0x38) 02:36:43 executing program 1: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x48) geteuid() r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x6, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x6, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$SMC_PNETID_FLUSH(r3, 0x0, 0x0) openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r5, 0x10, 0x0, @in={0x2, 0x0, @local}}}, 0x90) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000280), r5, r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000280), r5, r1}}, 0x18) sendmsg$L2TP_CMD_NOOP(r1, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, r0}, 0x38) 02:36:45 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0x4}, 0x38) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x58) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) connect$nfc_llcp(r0, &(0x7f0000000100)={0x27, r1, 0xffffffffffffffff, 0x0, 0x7f, 0x20, "7a441f8e8ce058fd24e774cbb5db73b18fddce0afb021bb6e935044c92468c1eb5aebb537342c297270be30926893935022eae0a44d24daba6eeb23db330b5", 0x32}, 0x58) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000480)={{0x1, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%ps \x00'}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x40, 0x7, 0x9, 0x300, r2, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x28c, 0xc}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={&(0x7f0000000640)="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", &(0x7f0000000180)=""/26, &(0x7f0000000300)="bc8ea03293a6599a945801bf31f86c1293ed36e5e574ff27d5e168c352ed7abe6cfddcb697094a678eb99226a8921b8072863f163cd1f7eb545a7474852e2b8098e723bfbc6da05c8f998e410873f1360a2be770c8e8b2cc4f986571318707e81f0623e52e46b8fdfe3cc4b3d93221b11793934854bf18fa32e7e18c658c36f28e0efb180b8d4c1d45d3bd7cdf2d8d0d4b0819d4a21692493182ecc778567e6fdf307437f1e9068f687ed8ee3bf148b025a378a3a3296d6a4e7b8ace7fe2fa785aeaef0728a4d153ae41a1628ed8c91259f95125d17bd41c0f8794153d", &(0x7f00000001c0)="7da9fdd8d41fe3e9b2f0b17f77d16cd3ef3af7fede9b9cf0ea1b47f038460315dd91df6bc7fa70490f987a8fe3a6afa82d687b603e312aa08e5856b602d57a", 0x4, r3, 0x4}, 0x38) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x9, &(0x7f0000000b40)={@private2, 0x0}, &(0x7f0000000b80)=0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0xe0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000c80)=[0x0, 0x0, 0x0], &(0x7f0000000cc0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000d00)=[{}], 0x8, 0x10, &(0x7f0000000d40), &(0x7f0000000d80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000dc0)}}, 0x10) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000f40)={0xffffffffffffffff}, 0x4) r7 = openat$dlm_plock(0xffffff9c, &(0x7f0000000f80), 0x400c00, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xd, &(0x7f0000000a80)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @map_fd={0x18, 0x3, 0x1, 0x0, r3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000000b00)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000c00)={0x3, 0x10, 0x9, 0x3}, 0x10, r5, r6, 0x2, &(0x7f0000000fc0)=[r3, r3, r2, r7, r3, r3], &(0x7f0000001000)=[{0x0, 0x2, 0xa, 0x6}, {0x1, 0x5, 0xb, 0xa}], 0x10, 0x3a0b6189}, 0x90) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x1a, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x83, 0x57, &(0x7f0000000780)=""/87, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000800)={0x2, 0x1, 0x101, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000008c0)=[r3, r2, r3, r2, r3, r8, r2, 0x1, r2, r2], &(0x7f0000000900)=[{0x2, 0x4, 0x6, 0xa}, {0x3, 0x2, 0x10}, {0x1, 0x5, 0x8, 0x2}, {0x2, 0x4, 0x5, 0x7}, {0x4, 0x4, 0x8, 0x5}, {0x0, 0x1, 0x4, 0x3}], 0x10, 0x9}, 0x90) r9 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r9, &(0x7f0000000a40)={0xa, 0x0, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x81, 0x4}, 0x20) 02:36:47 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0x4}, 0x38) (async) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x58) (async, rerun: 32) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) (rerun: 32) connect$nfc_llcp(r0, &(0x7f0000000100)={0x27, r1, 0xffffffffffffffff, 0x0, 0x7f, 0x20, "7a441f8e8ce058fd24e774cbb5db73b18fddce0afb021bb6e935044c92468c1eb5aebb537342c297270be30926893935022eae0a44d24daba6eeb23db330b5", 0x32}, 0x58) (async, rerun: 32) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000480)={{0x1, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%ps \x00'}, 0x20) (rerun: 32) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x40, 0x7, 0x9, 0x300, r2, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x28c, 0xc}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={&(0x7f0000000640)="22dbfa5d5d5f4ec98d9ba56885fa29b166f6c53986422d0af766b6fd209d8a7194ffcafbc634ba40e8f3b7f90f3ec5ab9f36431b2fd8c08a72774ea3108ffb359ffc5ea8da47fb75d3897382142ed2b3625d4b01254d7e0ab45af7cc38f503b5f5c4f23d037ec1a15ce4c53de39a64ddb2e6467dd68f9d512526ac2e2fa423b130900ee48c188b01c072140b009e2a7efcdb87ae1b7c9c2331bd3aaeacd414033cf40badc1c76aeed367559272c409bb531a95e9de6577567dee288ac4afae3bc0b4a630aa1e2c106e26f1528a852bcf94d1d9c1a1f847dacc47bfb6f4e90ae71ce0258ee1decda9ed3b55cf28235efd711721a145c34f4bf3de024f2cd834fcfe46cc0558bf3b632fc856db27b687dadf11ee72068c", &(0x7f0000000180)=""/26, &(0x7f0000000300)="bc8ea03293a6599a945801bf31f86c1293ed36e5e574ff27d5e168c352ed7abe6cfddcb697094a678eb99226a8921b8072863f163cd1f7eb545a7474852e2b8098e723bfbc6da05c8f998e410873f1360a2be770c8e8b2cc4f986571318707e81f0623e52e46b8fdfe3cc4b3d93221b11793934854bf18fa32e7e18c658c36f28e0efb180b8d4c1d45d3bd7cdf2d8d0d4b0819d4a21692493182ecc778567e6fdf307437f1e9068f687ed8ee3bf148b025a378a3a3296d6a4e7b8ace7fe2fa785aeaef0728a4d153ae41a1628ed8c91259f95125d17bd41c0f8794153d", &(0x7f00000001c0)="7da9fdd8d41fe3e9b2f0b17f77d16cd3ef3af7fede9b9cf0ea1b47f038460315dd91df6bc7fa70490f987a8fe3a6afa82d687b603e312aa08e5856b602d57a", 0x4, r3, 0x4}, 0x38) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x9, &(0x7f0000000b40)={@private2, 0x0}, &(0x7f0000000b80)=0x14) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0xe0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000c80)=[0x0, 0x0, 0x0], &(0x7f0000000cc0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000d00)=[{}], 0x8, 0x10, &(0x7f0000000d40), &(0x7f0000000d80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000dc0)}}, 0x10) (async) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000f40)={0xffffffffffffffff}, 0x4) (async) r7 = openat$dlm_plock(0xffffff9c, &(0x7f0000000f80), 0x400c00, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xd, &(0x7f0000000a80)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @map_fd={0x18, 0x3, 0x1, 0x0, r3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000000b00)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000c00)={0x3, 0x10, 0x9, 0x3}, 0x10, r5, r6, 0x2, &(0x7f0000000fc0)=[r3, r3, r2, r7, r3, r3], &(0x7f0000001000)=[{0x0, 0x2, 0xa, 0x6}, {0x1, 0x5, 0xb, 0xa}], 0x10, 0x3a0b6189}, 0x90) (async, rerun: 64) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2}, 0x48) (rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x1a, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x83, 0x57, &(0x7f0000000780)=""/87, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000800)={0x2, 0x1, 0x101, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000008c0)=[r3, r2, r3, r2, r3, r8, r2, 0x1, r2, r2], &(0x7f0000000900)=[{0x2, 0x4, 0x6, 0xa}, {0x3, 0x2, 0x10}, {0x1, 0x5, 0x8, 0x2}, {0x2, 0x4, 0x5, 0x7}, {0x4, 0x4, 0x8, 0x5}, {0x0, 0x1, 0x4, 0x3}], 0x10, 0x9}, 0x90) r9 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r9, &(0x7f0000000a40)={0xa, 0x0, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x81, 0x4}, 0x20) 02:36:47 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000040)=""/4096) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000040)=""/42) 02:36:47 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000040)=""/4096) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000040)=""/42) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) (async) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) (async) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000040)=""/4096) (async) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000040)=""/42) (async) 02:36:47 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0x4}, 0x38) (async) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x58) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) connect$nfc_llcp(r0, &(0x7f0000000100)={0x27, r1, 0xffffffffffffffff, 0x0, 0x7f, 0x20, "7a441f8e8ce058fd24e774cbb5db73b18fddce0afb021bb6e935044c92468c1eb5aebb537342c297270be30926893935022eae0a44d24daba6eeb23db330b5", 0x32}, 0x58) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000480)={{0x1, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%ps \x00'}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x40, 0x7, 0x9, 0x300, r2, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x28c, 0xc}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={&(0x7f0000000640)="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", &(0x7f0000000180)=""/26, &(0x7f0000000300)="bc8ea03293a6599a945801bf31f86c1293ed36e5e574ff27d5e168c352ed7abe6cfddcb697094a678eb99226a8921b8072863f163cd1f7eb545a7474852e2b8098e723bfbc6da05c8f998e410873f1360a2be770c8e8b2cc4f986571318707e81f0623e52e46b8fdfe3cc4b3d93221b11793934854bf18fa32e7e18c658c36f28e0efb180b8d4c1d45d3bd7cdf2d8d0d4b0819d4a21692493182ecc778567e6fdf307437f1e9068f687ed8ee3bf148b025a378a3a3296d6a4e7b8ace7fe2fa785aeaef0728a4d153ae41a1628ed8c91259f95125d17bd41c0f8794153d", &(0x7f00000001c0)="7da9fdd8d41fe3e9b2f0b17f77d16cd3ef3af7fede9b9cf0ea1b47f038460315dd91df6bc7fa70490f987a8fe3a6afa82d687b603e312aa08e5856b602d57a", 0x4, r3, 0x4}, 0x38) (async, rerun: 64) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x9, &(0x7f0000000b40)={@private2, 0x0}, &(0x7f0000000b80)=0x14) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0xe0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000c80)=[0x0, 0x0, 0x0], &(0x7f0000000cc0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000d00)=[{}], 0x8, 0x10, &(0x7f0000000d40), &(0x7f0000000d80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000dc0)}}, 0x10) (async) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000f40)={0xffffffffffffffff}, 0x4) (async) r7 = openat$dlm_plock(0xffffff9c, &(0x7f0000000f80), 0x400c00, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xd, &(0x7f0000000a80)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @map_fd={0x18, 0x3, 0x1, 0x0, r3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000000b00)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000c00)={0x3, 0x10, 0x9, 0x3}, 0x10, r5, r6, 0x2, &(0x7f0000000fc0)=[r3, r3, r2, r7, r3, r3], &(0x7f0000001000)=[{0x0, 0x2, 0xa, 0x6}, {0x1, 0x5, 0xb, 0xa}], 0x10, 0x3a0b6189}, 0x90) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x1a, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x83, 0x57, &(0x7f0000000780)=""/87, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000800)={0x2, 0x1, 0x101, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000008c0)=[r3, r2, r3, r2, r3, r8, r2, 0x1, r2, r2], &(0x7f0000000900)=[{0x2, 0x4, 0x6, 0xa}, {0x3, 0x2, 0x10}, {0x1, 0x5, 0x8, 0x2}, {0x2, 0x4, 0x5, 0x7}, {0x4, 0x4, 0x8, 0x5}, {0x0, 0x1, 0x4, 0x3}], 0x10, 0x9}, 0x90) (async) r9 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r9, &(0x7f0000000a40)={0xa, 0x0, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x81, 0x4}, 0x20) 02:36:47 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000040)=""/4096) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000040)=""/42) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) (async) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) (async) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000040)=""/4096) (async) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000040)=""/42) (async) 02:36:47 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000000)={@private0, 0x0}, &(0x7f0000000040)=0x14) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x40e040, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x4, 0x400, 0x3ff, 0x9, 0x2010, 0x1, 0x1, '\x00', r0, r1, 0x3, 0x0, 0x1}, 0x48) 02:36:48 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000000)={@private0}, &(0x7f0000000040)=0x14) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000000)={@private0, 0x0}, &(0x7f0000000040)=0x14) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x40e040, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x4, 0x400, 0x3ff, 0x9, 0x2010, 0x1, 0x1, '\x00', r0, r1, 0x3, 0x0, 0x1}, 0x48) 02:36:48 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000000)={@private0, 0x0}, &(0x7f0000000040)=0x14) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x40e040, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x4, 0x400, 0x3ff, 0x9, 0x2010, 0x1, 0x1, '\x00', r0, r1, 0x3, 0x0, 0x1}, 0x48) 02:36:48 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00'}, 0x20) r1 = openat$dir(0xffffff9c, &(0x7f0000000180)='./file0\x00', 0x84002, 0xca) execveat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000240)='[\x00', &(0x7f0000000280)='{/\x00', &(0x7f00000002c0)='%pK \x00', &(0x7f0000000300)='%pK \x00'], &(0x7f0000000440)=[&(0x7f0000000380)='%],\x00', &(0x7f00000003c0)='%pK \x00', &(0x7f0000000400)='#.^#%-\x00'], 0x100) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x10001}, 0xc) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000b00)={@desc={0x1, 0x0, @desc4}}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@func={0xa, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x0, 0x2e, 0x5f, 0x61, 0x2e, 0x51, 0x30, 0x5f]}}, &(0x7f0000000580)=""/67, 0x2e, 0x43, 0x1, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000700)=[0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000780)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1d, 0x5, &(0x7f00000004c0)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000000500)='syzkaller\x00', 0xb2, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0xe, r3, 0x8, &(0x7f0000000640)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x10, 0xd5e, 0x6}, 0x10, r4, 0xffffffffffffffff, 0x4, &(0x7f00000009c0)=[r0, r0, r0, r0, r0, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x4, 0x3, 0x9, 0xc}, {0x5, 0x2, 0x8, 0x5}, {0x3, 0x3, 0x1, 0xc}, {0x1, 0x1, 0x3, 0xc}], 0x10, 0x2}, 0x90) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x2, 0x1, 0x7, 0x80, r0, 0xfc3, '\x00', 0x0, r5, 0x1, 0x1, 0x4}, 0x48) 02:36:48 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x3f, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x12, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x3ff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}}}, &(0x7f0000000180)='GPL\x00', 0x0, 0xef, &(0x7f00000002c0)=""/239, 0x40f00, 0x20, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0x5, 0x40, 0x100}, 0x10, 0x1176b, 0xffffffffffffffff, 0x3, &(0x7f0000000700)=[r0, r0], &(0x7f0000000740)=[{0x3, 0x1, 0xe, 0x7}, {0x1, 0x5, 0xffff, 0x1}, {0x4, 0x5, 0x9, 0x2}], 0x10, 0x5}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r3}, 0x18) 02:36:48 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00'}, 0x20) r1 = openat$dir(0xffffff9c, &(0x7f0000000180)='./file0\x00', 0x84002, 0xca) execveat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000240)='[\x00', &(0x7f0000000280)='{/\x00', &(0x7f00000002c0)='%pK \x00', &(0x7f0000000300)='%pK \x00'], &(0x7f0000000440)=[&(0x7f0000000380)='%],\x00', &(0x7f00000003c0)='%pK \x00', &(0x7f0000000400)='#.^#%-\x00'], 0x100) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x10001}, 0xc) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000b00)={@desc={0x1, 0x0, @desc4}}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@func={0xa, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x0, 0x2e, 0x5f, 0x61, 0x2e, 0x51, 0x30, 0x5f]}}, &(0x7f0000000580)=""/67, 0x2e, 0x43, 0x1, 0x1}, 0x20) (async) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@func={0xa, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x0, 0x2e, 0x5f, 0x61, 0x2e, 0x51, 0x30, 0x5f]}}, &(0x7f0000000580)=""/67, 0x2e, 0x43, 0x1, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000700)=[0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000780)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1d, 0x5, &(0x7f00000004c0)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000000500)='syzkaller\x00', 0xb2, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0xe, r3, 0x8, &(0x7f0000000640)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x10, 0xd5e, 0x6}, 0x10, r4, 0xffffffffffffffff, 0x4, &(0x7f00000009c0)=[r0, r0, r0, r0, r0, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x4, 0x3, 0x9, 0xc}, {0x5, 0x2, 0x8, 0x5}, {0x3, 0x3, 0x1, 0xc}, {0x1, 0x1, 0x3, 0xc}], 0x10, 0x2}, 0x90) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x2, 0x1, 0x7, 0x80, r0, 0xfc3, '\x00', 0x0, r5, 0x1, 0x1, 0x4}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x2, 0x1, 0x7, 0x80, r0, 0xfc3, '\x00', 0x0, r5, 0x1, 0x1, 0x4}, 0x48) 02:36:48 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x3f, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x12, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x3ff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}}}, &(0x7f0000000180)='GPL\x00', 0x0, 0xef, &(0x7f00000002c0)=""/239, 0x40f00, 0x20, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0x5, 0x40, 0x100}, 0x10, 0x1176b, 0xffffffffffffffff, 0x3, &(0x7f0000000700)=[r0, r0], &(0x7f0000000740)=[{0x3, 0x1, 0xe, 0x7}, {0x1, 0x5, 0xffff, 0x1}, {0x4, 0x5, 0x9, 0x2}], 0x10, 0x5}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r3}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x3f, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x12, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x3ff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}}}, &(0x7f0000000180)='GPL\x00', 0x0, 0xef, &(0x7f00000002c0)=""/239, 0x40f00, 0x20, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0x5, 0x40, 0x100}, 0x10, 0x1176b, 0xffffffffffffffff, 0x3, &(0x7f0000000700)=[r0, r0], &(0x7f0000000740)=[{0x3, 0x1, 0xe, 0x7}, {0x1, 0x5, 0xffff, 0x1}, {0x4, 0x5, 0x9, 0x2}], 0x10, 0x5}, 0x90) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r3}, 0x18) (async) 02:36:49 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00'}, 0x20) r1 = openat$dir(0xffffff9c, &(0x7f0000000180)='./file0\x00', 0x84002, 0xca) execveat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000240)='[\x00', &(0x7f0000000280)='{/\x00', &(0x7f00000002c0)='%pK \x00', &(0x7f0000000300)='%pK \x00'], &(0x7f0000000440)=[&(0x7f0000000380)='%],\x00', &(0x7f00000003c0)='%pK \x00', &(0x7f0000000400)='#.^#%-\x00'], 0x100) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x10001}, 0xc) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000b00)={@desc={0x1, 0x0, @desc4}}) (async) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@func={0xa, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x0, 0x2e, 0x5f, 0x61, 0x2e, 0x51, 0x30, 0x5f]}}, &(0x7f0000000580)=""/67, 0x2e, 0x43, 0x1, 0x1}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000700)=[0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000780)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1d, 0x5, &(0x7f00000004c0)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000000500)='syzkaller\x00', 0xb2, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0xe, r3, 0x8, &(0x7f0000000640)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x10, 0xd5e, 0x6}, 0x10, r4, 0xffffffffffffffff, 0x4, &(0x7f00000009c0)=[r0, r0, r0, r0, r0, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x4, 0x3, 0x9, 0xc}, {0x5, 0x2, 0x8, 0x5}, {0x3, 0x3, 0x1, 0xc}, {0x1, 0x1, 0x3, 0xc}], 0x10, 0x2}, 0x90) (async) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x2, 0x1, 0x7, 0x80, r0, 0xfc3, '\x00', 0x0, r5, 0x1, 0x1, 0x4}, 0x48) 02:36:49 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x3f, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x12, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x3ff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}}}, &(0x7f0000000180)='GPL\x00', 0x0, 0xef, &(0x7f00000002c0)=""/239, 0x40f00, 0x20, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0x5, 0x40, 0x100}, 0x10, 0x1176b, 0xffffffffffffffff, 0x3, &(0x7f0000000700)=[r0, r0], &(0x7f0000000740)=[{0x3, 0x1, 0xe, 0x7}, {0x1, 0x5, 0xffff, 0x1}, {0x4, 0x5, 0x9, 0x2}], 0x10, 0x5}, 0x90) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r3}, 0x18) 02:36:49 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) mknodat$null(r0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x103) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, r0, 0x2957b69d, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x2}, 0x48) 02:36:49 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0xfffffffc}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x9, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r2, 0x6}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r1}, 0x18) 02:36:49 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) mknodat$null(r0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x103) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, r0, 0x2957b69d, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x2}, 0x48) 02:36:49 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0xfffffffc}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x9, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r2, 0x6}, 0xc) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r1}, 0x18) 02:36:49 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) (async) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) mknodat$null(r0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x103) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, r0, 0x2957b69d, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x2}, 0x48) 02:36:49 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0xfffffffc}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x9, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r2, 0x6}, 0xc) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r1}, 0x18) 02:36:49 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0x1, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000001240), 0x200, 0x0) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$tcp_congestion(r3, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001340)={0x18, 0x18, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x88}, [@exit, @map_val={0x18, 0xd, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xff}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x24}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f00000001c0)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000240)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000001280)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000012c0)={0x5, 0xf, 0x14000, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001300)=[r3], 0x0, 0x10, 0x4}, 0x90) 02:36:50 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)='%pI4 \x00'}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r2}, 0x18) 02:36:50 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0x1, 0xffffffffffffffff}, 0x4) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000001240), 0x200, 0x0) (async) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$tcp_congestion(r3, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001340)={0x18, 0x18, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x88}, [@exit, @map_val={0x18, 0xd, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xff}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x24}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f00000001c0)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000240)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000001280)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000012c0)={0x5, 0xf, 0x14000, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001300)=[r3], 0x0, 0x10, 0x4}, 0x90) 02:36:50 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)='%pI4 \x00'}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r2}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1}, 0x4) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)='%pI4 \x00'}, 0x20) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r2}, 0x18) (async) 02:36:50 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0x1, 0xffffffffffffffff}, 0x4) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000001240), 0x200, 0x0) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$tcp_congestion(r3, 0x0, 0x0) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001340)={0x18, 0x18, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x88}, [@exit, @map_val={0x18, 0xd, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xff}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x24}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f00000001c0)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000240)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000001280)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000012c0)={0x5, 0xf, 0x14000, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001300)=[r3], 0x0, 0x10, 0x4}, 0x90) (rerun: 32) 02:36:50 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)='%pI4 \x00'}, 0x20) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r2}, 0x18) 02:36:50 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_lsm={0x1d, 0x29, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xba}, {}, {}, [@exit, @alu={0x4, 0x0, 0x3, 0x8, 0x4, 0xffffffffffffffff, 0xfffffffffffffff9}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @jmp={0x5, 0x1, 0x5, 0x1, 0x4, 0xfffffffffffffffc, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @jmp={0x5, 0x0, 0x9, 0x6, 0x2, 0xfffffffffffffff0, 0x4}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='GPL\x00', 0x6, 0x81, &(0x7f00000003c0)=""/129, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x4, 0x3, 0x9}, 0x10, r2, 0x0, 0x9, &(0x7f0000000780)=[r0], &(0x7f00000007c0)=[{0x1, 0x5, 0xc, 0x9}, {0x4, 0x1, 0xe, 0xa}, {0x1, 0x3, 0x3, 0x2}, {0x1, 0x3, 0xa, 0x3}, {0x5, 0x4, 0x1, 0xc}, {0x4, 0x5, 0xe, 0xc}, {0x3, 0x1, 0x7, 0xb}, {0x2, 0x4, 0x3, 0x6}, {0x5, 0x4, 0x0, 0xc}], 0x10, 0x8}, 0x90) 02:36:50 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_lsm={0x1d, 0x29, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xba}, {}, {}, [@exit, @alu={0x4, 0x0, 0x3, 0x8, 0x4, 0xffffffffffffffff, 0xfffffffffffffff9}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @jmp={0x5, 0x1, 0x5, 0x1, 0x4, 0xfffffffffffffffc, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @jmp={0x5, 0x0, 0x9, 0x6, 0x2, 0xfffffffffffffff0, 0x4}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='GPL\x00', 0x6, 0x81, &(0x7f00000003c0)=""/129, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x4, 0x3, 0x9}, 0x10, r2, 0x0, 0x9, &(0x7f0000000780)=[r0], &(0x7f00000007c0)=[{0x1, 0x5, 0xc, 0x9}, {0x4, 0x1, 0xe, 0xa}, {0x1, 0x3, 0x3, 0x2}, {0x1, 0x3, 0xa, 0x3}, {0x5, 0x4, 0x1, 0xc}, {0x4, 0x5, 0xe, 0xc}, {0x3, 0x1, 0x7, 0xb}, {0x2, 0x4, 0x3, 0x6}, {0x5, 0x4, 0x0, 0xc}], 0x10, 0x8}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_lsm={0x1d, 0x29, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xba}, {}, {}, [@exit, @alu={0x4, 0x0, 0x3, 0x8, 0x4, 0xffffffffffffffff, 0xfffffffffffffff9}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @jmp={0x5, 0x1, 0x5, 0x1, 0x4, 0xfffffffffffffffc, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @jmp={0x5, 0x0, 0x9, 0x6, 0x2, 0xfffffffffffffff0, 0x4}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='GPL\x00', 0x6, 0x81, &(0x7f00000003c0)=""/129, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x4, 0x3, 0x9}, 0x10, r2, 0x0, 0x9, &(0x7f0000000780)=[r0], &(0x7f00000007c0)=[{0x1, 0x5, 0xc, 0x9}, {0x4, 0x1, 0xe, 0xa}, {0x1, 0x3, 0x3, 0x2}, {0x1, 0x3, 0xa, 0x3}, {0x5, 0x4, 0x1, 0xc}, {0x4, 0x5, 0xe, 0xc}, {0x3, 0x1, 0x7, 0xb}, {0x2, 0x4, 0x3, 0x6}, {0x5, 0x4, 0x0, 0xc}], 0x10, 0x8}, 0x90) 02:36:51 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_lsm={0x1d, 0x29, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xba}, {}, {}, [@exit, @alu={0x4, 0x0, 0x3, 0x8, 0x4, 0xffffffffffffffff, 0xfffffffffffffff9}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @jmp={0x5, 0x1, 0x5, 0x1, 0x4, 0xfffffffffffffffc, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @jmp={0x5, 0x0, 0x9, 0x6, 0x2, 0xfffffffffffffff0, 0x4}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='GPL\x00', 0x6, 0x81, &(0x7f00000003c0)=""/129, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x4, 0x3, 0x9}, 0x10, r2, 0x0, 0x9, &(0x7f0000000780)=[r0], &(0x7f00000007c0)=[{0x1, 0x5, 0xc, 0x9}, {0x4, 0x1, 0xe, 0xa}, {0x1, 0x3, 0x3, 0x2}, {0x1, 0x3, 0xa, 0x3}, {0x5, 0x4, 0x1, 0xc}, {0x4, 0x5, 0xe, 0xc}, {0x3, 0x1, 0x7, 0xb}, {0x2, 0x4, 0x3, 0x6}, {0x5, 0x4, 0x0, 0xc}], 0x10, 0x8}, 0x90) 02:36:51 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x20000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000002c0)={@mcast2, 0x0}, &(0x7f0000000300)=0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000700)={0xfffffffc, 0x1, {0x1, 0x1, 0x3, 0x0, 0x2}, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000540)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000005c0)={0x4, 0x8, 0xfa00, {r3, 0x3ff}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="180000002bfaffffffffffff0501000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x10000, 0xe4, &(0x7f0000000140)=""/228, 0x40f00, 0x10, '\x00', r2, 0x25, r4, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x1, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000400)=[{0x2, 0x5, 0x10, 0xa}, {0x3, 0x1, 0x8, 0xc}, {0x5, 0x4, 0x8, 0x8}, {0x0, 0x5, 0xd}, {0x0, 0x4, 0x1, 0x7}, {0x3, 0x5, 0x3, 0x4}], 0x10, 0x36ef}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r0}, &(0x7f0000000600), &(0x7f0000000640)='%pB \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r5}, 0x18) 02:36:51 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, r0, 0x4}, 0x38) 02:36:51 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x20000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000002c0)={@mcast2, 0x0}, &(0x7f0000000300)=0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000700)={0xfffffffc, 0x1, {0x1, 0x1, 0x3, 0x0, 0x2}, 0x1}) (async) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000700)={0xfffffffc, 0x1, {0x1, 0x1, 0x3, 0x0, 0x2}, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000540)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000005c0)={0x4, 0x8, 0xfa00, {r3, 0x3ff}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000005c0)={0x4, 0x8, 0xfa00, {r3, 0x3ff}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="180000002bfaffffffffffff0501000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x10000, 0xe4, &(0x7f0000000140)=""/228, 0x40f00, 0x10, '\x00', r2, 0x25, r4, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x1, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000400)=[{0x2, 0x5, 0x10, 0xa}, {0x3, 0x1, 0x8, 0xc}, {0x5, 0x4, 0x8, 0x8}, {0x0, 0x5, 0xd}, {0x0, 0x4, 0x1, 0x7}, {0x3, 0x5, 0x3, 0x4}], 0x10, 0x36ef}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r0}, &(0x7f0000000600), &(0x7f0000000640)='%pB \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r0}, &(0x7f0000000600), &(0x7f0000000640)='%pB \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r5}, 0x18) 02:36:51 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, r0, 0x4}, 0x38) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, r0, 0x4}, 0x38) (async) 02:36:51 executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, r0, 0x4}, 0x38) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, r0, 0x4}, 0x38) (async) 02:36:51 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async, rerun: 64) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x20000, 0x0) (rerun: 64) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000002c0)={@mcast2, 0x0}, &(0x7f0000000300)=0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000700)={0xfffffffc, 0x1, {0x1, 0x1, 0x3, 0x0, 0x2}, 0x1}) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000540)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000005c0)={0x4, 0x8, 0xfa00, {r3, 0x3ff}}, 0x10) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="180000002bfaffffffffffff0501000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x10000, 0xe4, &(0x7f0000000140)=""/228, 0x40f00, 0x10, '\x00', r2, 0x25, r4, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x1, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000400)=[{0x2, 0x5, 0x10, 0xa}, {0x3, 0x1, 0x8, 0xc}, {0x5, 0x4, 0x8, 0x8}, {0x0, 0x5, 0xd}, {0x0, 0x4, 0x1, 0x7}, {0x3, 0x5, 0x3, 0x4}], 0x10, 0x36ef}, 0x90) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r0}, &(0x7f0000000600), &(0x7f0000000640)='%pB \x00'}, 0x20) (async, rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r5}, 0x18) (rerun: 32) 02:36:52 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 02:36:52 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$RNDADDENTROPY(r0, 0x40085203, 0x0) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) (async) 02:36:52 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x10, 0x10, 0x1, 0xa4, 0x880, r0, 0x5, '\x00', r1, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@map=r2, 0x1f, 0x1, 0x4, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)=[0x0, 0x0], &(0x7f0000000700), &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r2, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000700)={&(0x7f00000005c0)="43320ab3358b2aed0616dd4415c36b586e3d5f30a9c17e13f0042bb86dcd6f9636d65c8ef690a8c31f115a6280acdf5b1eaf57b7a37491", &(0x7f0000000840)=""/212, &(0x7f0000000940)="2069fe83a5c53338d2fe552a7d71f5223f3c43c3668730d00f5d670e8fc41087fa26efbc3c5733fa8e60230145da5d9c666eb80c4e844573c0e6609faf27f4263e2a49e09b99d44bb51fe033d820d5790ab25146d00024dba3cb6d8af03822cb7cd8b91d4d04cb9f93e97e91e7c5a38357a4cd33f5ceb39ef3fc26a8e688c59916d691c9a533b9fe843e474329cb57af01", &(0x7f0000000a00)="7145abb159af5ac42832382a63f5e5d975a9d9eaac94386fdeca3ba372426d0fd1485ecce4403717413b75d19876ec55d879d828b56699e52889cd1c69dbb24f9dd4411245a62286948af2ee3bd86ab735da98683a634c0205536bb53b0843c9d981cf8b", 0xe23, r0, 0x4}, 0x38) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000800)={@cgroup, 0x5, 0x0, 0xc8, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780), &(0x7f00000007c0)=[0x0]}, 0x40) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@cgroup=r2, 0x20, 0x1, 0x1, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0]}, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0\x00', r0, 0x4000, r0}, 0x18) 02:36:52 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, 0x0) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 02:36:52 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x3, r0}, 0x38) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1f) 02:36:52 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x10, 0x10, 0x1, 0xa4, 0x880, r0, 0x5, '\x00', r1, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@map=r2, 0x1f, 0x1, 0x4, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)=[0x0, 0x0], &(0x7f0000000700), &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async, rerun: 32) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r2, 0x0, 0x0) (async, rerun: 32) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000700)={&(0x7f00000005c0)="43320ab3358b2aed0616dd4415c36b586e3d5f30a9c17e13f0042bb86dcd6f9636d65c8ef690a8c31f115a6280acdf5b1eaf57b7a37491", &(0x7f0000000840)=""/212, &(0x7f0000000940)="2069fe83a5c53338d2fe552a7d71f5223f3c43c3668730d00f5d670e8fc41087fa26efbc3c5733fa8e60230145da5d9c666eb80c4e844573c0e6609faf27f4263e2a49e09b99d44bb51fe033d820d5790ab25146d00024dba3cb6d8af03822cb7cd8b91d4d04cb9f93e97e91e7c5a38357a4cd33f5ceb39ef3fc26a8e688c59916d691c9a533b9fe843e474329cb57af01", &(0x7f0000000a00)="7145abb159af5ac42832382a63f5e5d975a9d9eaac94386fdeca3ba372426d0fd1485ecce4403717413b75d19876ec55d879d828b56699e52889cd1c69dbb24f9dd4411245a62286948af2ee3bd86ab735da98683a634c0205536bb53b0843c9d981cf8b", 0xe23, r0, 0x4}, 0x38) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000800)={@cgroup, 0x5, 0x0, 0xc8, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780), &(0x7f00000007c0)=[0x0]}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@cgroup=r2, 0x20, 0x1, 0x1, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0]}, 0x40) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0\x00', r0, 0x4000, r0}, 0x18) 02:36:53 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x3, r0}, 0x38) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1f) (async) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1f) 02:36:53 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x10, 0x10, 0x1, 0xa4, 0x880, r0, 0x5, '\x00', r1, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@map=r2, 0x1f, 0x1, 0x4, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)=[0x0, 0x0], &(0x7f0000000700), &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r2, 0x0, 0x0) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000700)={&(0x7f00000005c0)="43320ab3358b2aed0616dd4415c36b586e3d5f30a9c17e13f0042bb86dcd6f9636d65c8ef690a8c31f115a6280acdf5b1eaf57b7a37491", &(0x7f0000000840)=""/212, &(0x7f0000000940)="2069fe83a5c53338d2fe552a7d71f5223f3c43c3668730d00f5d670e8fc41087fa26efbc3c5733fa8e60230145da5d9c666eb80c4e844573c0e6609faf27f4263e2a49e09b99d44bb51fe033d820d5790ab25146d00024dba3cb6d8af03822cb7cd8b91d4d04cb9f93e97e91e7c5a38357a4cd33f5ceb39ef3fc26a8e688c59916d691c9a533b9fe843e474329cb57af01", &(0x7f0000000a00)="7145abb159af5ac42832382a63f5e5d975a9d9eaac94386fdeca3ba372426d0fd1485ecce4403717413b75d19876ec55d879d828b56699e52889cd1c69dbb24f9dd4411245a62286948af2ee3bd86ab735da98683a634c0205536bb53b0843c9d981cf8b", 0xe23, r0, 0x4}, 0x38) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000800)={@cgroup, 0x5, 0x0, 0xc8, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780), &(0x7f00000007c0)=[0x0]}, 0x40) (async, rerun: 32) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@cgroup=r2, 0x20, 0x1, 0x1, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0]}, 0x40) (rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0\x00', r0, 0x4000, r0}, 0x18) 02:36:53 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x3, r0}, 0x38) (async) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1f) 02:36:53 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x6, 0x3, 0x7, 0x2}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, &(0x7f0000000340)={&(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x1, r3}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', 0x0, r2, 0x5, 0x3, 0x5}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:36:54 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x19, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe27, 0x0, 0x0, 0x0, 0x3ad}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x961f}, @call={0x85, 0x0, 0x0, 0x87}, @ldst={0x0, 0x0, 0x2, 0xb, 0x1, 0xfffffffffffffff0, 0x1}, @jmp={0x5, 0x1, 0x4, 0x8, 0x6, 0x30, 0x10}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x8}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x8a}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='GPL\x00', 0x9, 0xe2, &(0x7f0000000480)=""/226, 0x41100, 0x35, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)=[{0x3, 0x5, 0x5, 0x7}], 0x10, 0x6}, 0x90) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, r0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000180)='GPL\x00', 0x81, 0x7c, &(0x7f0000000240)=""/124, 0x100, 0x8, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x9, 0xfffffffb, 0x1}, 0x10, 0x112b4, r2, 0x5, &(0x7f00000006c0)=[r3], &(0x7f0000000700)=[{0x5, 0x1, 0xa, 0xc}, {0x1, 0x2, 0x6, 0x7}, {0x3, 0x7ff, 0xe}, {0x1, 0x3, 0x8, 0x4}, {0x0, 0x4, 0x8, 0x9}], 0x10, 0x5}, 0x90) 02:36:54 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x19, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe27, 0x0, 0x0, 0x0, 0x3ad}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x961f}, @call={0x85, 0x0, 0x0, 0x87}, @ldst={0x0, 0x0, 0x2, 0xb, 0x1, 0xfffffffffffffff0, 0x1}, @jmp={0x5, 0x1, 0x4, 0x8, 0x6, 0x30, 0x10}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x8}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x8a}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='GPL\x00', 0x9, 0xe2, &(0x7f0000000480)=""/226, 0x41100, 0x35, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)=[{0x3, 0x5, 0x5, 0x7}], 0x10, 0x6}, 0x90) (async) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, r0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000180)='GPL\x00', 0x81, 0x7c, &(0x7f0000000240)=""/124, 0x100, 0x8, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x9, 0xfffffffb, 0x1}, 0x10, 0x112b4, r2, 0x5, &(0x7f00000006c0)=[r3], &(0x7f0000000700)=[{0x5, 0x1, 0xa, 0xc}, {0x1, 0x2, 0x6, 0x7}, {0x3, 0x7ff, 0xe}, {0x1, 0x3, 0x8, 0x4}, {0x0, 0x4, 0x8, 0x9}], 0x10, 0x5}, 0x90) 02:36:55 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2}, 0x48) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) (async, rerun: 32) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x19, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe27, 0x0, 0x0, 0x0, 0x3ad}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x961f}, @call={0x85, 0x0, 0x0, 0x87}, @ldst={0x0, 0x0, 0x2, 0xb, 0x1, 0xfffffffffffffff0, 0x1}, @jmp={0x5, 0x1, 0x4, 0x8, 0x6, 0x30, 0x10}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x8}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x8a}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='GPL\x00', 0x9, 0xe2, &(0x7f0000000480)=""/226, 0x41100, 0x35, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)=[{0x3, 0x5, 0x5, 0x7}], 0x10, 0x6}, 0x90) (async) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, r0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000180)='GPL\x00', 0x81, 0x7c, &(0x7f0000000240)=""/124, 0x100, 0x8, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x9, 0xfffffffb, 0x1}, 0x10, 0x112b4, r2, 0x5, &(0x7f00000006c0)=[r3], &(0x7f0000000700)=[{0x5, 0x1, 0xa, 0xc}, {0x1, 0x2, 0x6, 0x7}, {0x3, 0x7ff, 0xe}, {0x1, 0x3, 0x8, 0x4}, {0x0, 0x4, 0x8, 0x9}], 0x10, 0x5}, 0x90) 02:36:55 executing program 1: r0 = openat$sndseq(0xffffff9c, &(0x7f0000000000), 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000040)={0x8, 0x1, 0x0, 'queue0\x00', 0xd7cb}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) 02:36:56 executing program 1: r0 = openat$sndseq(0xffffff9c, &(0x7f0000000000), 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000040)={0x8, 0x1, 0x0, 'queue0\x00', 0xd7cb}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) openat$sndseq(0xffffff9c, &(0x7f0000000000), 0x800) (async) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000040)={0x8, 0x1, 0x0, 'queue0\x00', 0xd7cb}) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) (async) 02:36:56 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x6, 0x3, 0x7, 0x2}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, &(0x7f0000000340)={&(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x1, r3}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', 0x0, r2, 0x5, 0x3, 0x5}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x6, 0x3, 0x7, 0x2}) (async) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, &(0x7f0000000340)={&(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x1, r3}) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', 0x0, r2, 0x5, 0x3, 0x5}, 0x48) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) (async) 02:36:56 executing program 1: openat$sndseq(0xffffff9c, &(0x7f0000000000), 0x800) (async) r0 = openat$sndseq(0xffffff9c, &(0x7f0000000000), 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000040)={0x8, 0x1, 0x0, 'queue0\x00', 0xd7cb}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) 02:36:56 executing program 1: r0 = openat$sndseq(0xffffff9c, &(0x7f00000003c0), 0x103100) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000400)={0x81, 0x7, 0x3967, 0xaa8, 0x1f, 0xffffffff}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000440)={{0x1f, 0xf7}, {0x1, 0x2}, 0x3ff, 0x5, 0x6}) r1 = openat$random(0xffffff9c, &(0x7f0000000000), 0x109601, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0x400) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) socket$nl_rdma(0x10, 0x3, 0x14) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000380)={&(0x7f0000000080)="09917ac12944244114e711c72a718599c6f78c08858152e4b9aca9210f387b47eb337cdd47ce4cf29b452685f9bbc1e76326f14648902834b7a328c8d0ed89706e1f", &(0x7f0000000100)=""/29, &(0x7f0000000240)="eccbeb637bae860a5b93a08ebf02b47760893a8ca2f250aeccdf10b32937478893854dbd8c16d1a05f8ac00c96f30a92a3b2ee391e4a04ad225902760acbb87758f2b0b1698b988114847640e1e178e5a99e100366fcec2f7f57fa35da1e4360050e53302c0634d6103b6f27bfca7f5d923e845578d4e8776813ca0cb199983810f6af7f0bf8aaa5a2d1ff3966910a57a9b5dfe3f46cbfb95da8faa25a2e3e8dcbda414ad65307a6b305a5d3097cbb4f4e714473003329d15ed5534c9a29994b47eb1ce52016e012e706648b55b42912", &(0x7f0000000140)="7d8a178ee1eff68f195acc87525646a711c912da8cd6684a3560be5ba5ea7531730dc6ef26979abfed7c99d995e5fd17d7d213303d2426cb01de53d8b9bd47a3858c416fa28f46e33382961350857db7e69d73d2f16c39abb3716847ae5a6d3db4e6349878d4d18af2057191964ac7a2aa9dce4eb0444642e3139e5aaef8b35c27b55b97965a0b0d88b63bcc97ae868d48378885212a2ae0013f78c555007c90a595c61b83faf9ede2877ef6e187589ea838", 0x7ff, r2}, 0x38) 02:36:57 executing program 1: r0 = openat$sndseq(0xffffff9c, &(0x7f00000003c0), 0x103100) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000400)={0x81, 0x7, 0x3967, 0xaa8, 0x1f, 0xffffffff}) (async) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000440)={{0x1f, 0xf7}, {0x1, 0x2}, 0x3ff, 0x5, 0x6}) (async) r1 = openat$random(0xffffff9c, &(0x7f0000000000), 0x109601, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0x400) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) socket$nl_rdma(0x10, 0x3, 0x14) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000380)={&(0x7f0000000080)="09917ac12944244114e711c72a718599c6f78c08858152e4b9aca9210f387b47eb337cdd47ce4cf29b452685f9bbc1e76326f14648902834b7a328c8d0ed89706e1f", &(0x7f0000000100)=""/29, &(0x7f0000000240)="eccbeb637bae860a5b93a08ebf02b47760893a8ca2f250aeccdf10b32937478893854dbd8c16d1a05f8ac00c96f30a92a3b2ee391e4a04ad225902760acbb87758f2b0b1698b988114847640e1e178e5a99e100366fcec2f7f57fa35da1e4360050e53302c0634d6103b6f27bfca7f5d923e845578d4e8776813ca0cb199983810f6af7f0bf8aaa5a2d1ff3966910a57a9b5dfe3f46cbfb95da8faa25a2e3e8dcbda414ad65307a6b305a5d3097cbb4f4e714473003329d15ed5534c9a29994b47eb1ce52016e012e706648b55b42912", &(0x7f0000000140)="7d8a178ee1eff68f195acc87525646a711c912da8cd6684a3560be5ba5ea7531730dc6ef26979abfed7c99d995e5fd17d7d213303d2426cb01de53d8b9bd47a3858c416fa28f46e33382961350857db7e69d73d2f16c39abb3716847ae5a6d3db4e6349878d4d18af2057191964ac7a2aa9dce4eb0444642e3139e5aaef8b35c27b55b97965a0b0d88b63bcc97ae868d48378885212a2ae0013f78c555007c90a595c61b83faf9ede2877ef6e187589ea838", 0x7ff, r2}, 0x38) 02:36:57 executing program 1: r0 = openat$sndseq(0xffffff9c, &(0x7f00000003c0), 0x103100) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000400)={0x81, 0x7, 0x3967, 0xaa8, 0x1f, 0xffffffff}) (async) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000440)={{0x1f, 0xf7}, {0x1, 0x2}, 0x3ff, 0x5, 0x6}) (async) r1 = openat$random(0xffffff9c, &(0x7f0000000000), 0x109601, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0x400) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) socket$nl_rdma(0x10, 0x3, 0x14) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000380)={&(0x7f0000000080)="09917ac12944244114e711c72a718599c6f78c08858152e4b9aca9210f387b47eb337cdd47ce4cf29b452685f9bbc1e76326f14648902834b7a328c8d0ed89706e1f", &(0x7f0000000100)=""/29, &(0x7f0000000240)="eccbeb637bae860a5b93a08ebf02b47760893a8ca2f250aeccdf10b32937478893854dbd8c16d1a05f8ac00c96f30a92a3b2ee391e4a04ad225902760acbb87758f2b0b1698b988114847640e1e178e5a99e100366fcec2f7f57fa35da1e4360050e53302c0634d6103b6f27bfca7f5d923e845578d4e8776813ca0cb199983810f6af7f0bf8aaa5a2d1ff3966910a57a9b5dfe3f46cbfb95da8faa25a2e3e8dcbda414ad65307a6b305a5d3097cbb4f4e714473003329d15ed5534c9a29994b47eb1ce52016e012e706648b55b42912", &(0x7f0000000140)="7d8a178ee1eff68f195acc87525646a711c912da8cd6684a3560be5ba5ea7531730dc6ef26979abfed7c99d995e5fd17d7d213303d2426cb01de53d8b9bd47a3858c416fa28f46e33382961350857db7e69d73d2f16c39abb3716847ae5a6d3db4e6349878d4d18af2057191964ac7a2aa9dce4eb0444642e3139e5aaef8b35c27b55b97965a0b0d88b63bcc97ae868d48378885212a2ae0013f78c555007c90a595c61b83faf9ede2877ef6e187589ea838", 0x7ff, r2}, 0x38) 02:36:57 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) 02:36:58 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) 02:36:58 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff7b) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) 02:36:58 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x6, 0x3, 0x7, 0x2}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x6, 0x3, 0x7, 0x2}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, &(0x7f0000000340)={&(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x1, r3}) (async) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, &(0x7f0000000340)={&(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x1, r3}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', 0x0, r2, 0x5, 0x3, 0x5}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', 0x0, r2, 0x5, 0x3, 0x5}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:36:58 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x5d6d5ad12d2533de, &(0x7f0000000300)={@initdev, 0x0}, &(0x7f0000000340)=0x14) r3 = openat$dir(0xffffff9c, &(0x7f0000000400)='./file0/file0\x00', 0x101201, 0xe1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000440)={@desc={0x1, 0x0, @desc1}}) accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x1000) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1a, 0xfff, 0xf3, 0x1, 0x10, 0x1, 0x7fffffff, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r4 = openat$rdma_cm(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r5}}, 0x18) write$damon_attrs(0xffffffffffffffff, &(0x7f00000000c0)={{' ', 0xa5f}, {' ', 0x980f}, {' ', 0x6}, {' ', 0x1}, {' ', 0xffffffffffffffc1}}, 0x69) 02:36:59 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x5d6d5ad12d2533de, &(0x7f0000000300)={@initdev, 0x0}, &(0x7f0000000340)=0x14) r3 = openat$dir(0xffffff9c, &(0x7f0000000400)='./file0/file0\x00', 0x101201, 0xe1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000440)={@desc={0x1, 0x0, @desc1}}) accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x1000) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1a, 0xfff, 0xf3, 0x1, 0x10, 0x1, 0x7fffffff, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r4 = openat$rdma_cm(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r5}}, 0x18) write$damon_attrs(0xffffffffffffffff, &(0x7f00000000c0)={{' ', 0xa5f}, {' ', 0x980f}, {' ', 0x6}, {' ', 0x1}, {' ', 0xffffffffffffffc1}}, 0x69) 02:36:59 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x5d6d5ad12d2533de, &(0x7f0000000300)={@initdev, 0x0}, &(0x7f0000000340)=0x14) r3 = openat$dir(0xffffff9c, &(0x7f0000000400)='./file0/file0\x00', 0x101201, 0xe1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000440)={@desc={0x1, 0x0, @desc1}}) accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x1000) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1a, 0xfff, 0xf3, 0x1, 0x10, 0x1, 0x7fffffff, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) r4 = openat$rdma_cm(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r5}}, 0x18) write$damon_attrs(0xffffffffffffffff, &(0x7f00000000c0)={{' ', 0xa5f}, {' ', 0x980f}, {' ', 0x6}, {' ', 0x1}, {' ', 0xffffffffffffffc1}}, 0x69) 02:37:00 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:00 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:00 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) 02:37:00 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) 02:37:01 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) 02:37:01 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000002c0)={@empty, 0x0}, &(0x7f0000000300)=0x14) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000340), 0x10000, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x10, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc}, [@generic={0x80, 0x8, 0x0, 0xf320, 0x80000}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}]}, &(0x7f0000000180)='GPL\x00', 0x2, 0x46, &(0x7f00000001c0)=""/70, 0x40f00, 0x10, '\x00', r3, 0x25, r4, 0x8, &(0x7f0000000380)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x8, 0xa, 0x6}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000400)=[r1, r1], &(0x7f0000000440)=[{0x3, 0x2, 0x3, 0x4}, {0x0, 0x1, 0x1, 0xb}, {0x3, 0x4, 0x7, 0x9}, {0x1, 0x1, 0x6, 0x4}], 0x10, 0x3}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:01 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:37:01 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:37:01 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000002c0)={@empty, 0x0}, &(0x7f0000000300)=0x14) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000340), 0x10000, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x10, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc}, [@generic={0x80, 0x8, 0x0, 0xf320, 0x80000}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}]}, &(0x7f0000000180)='GPL\x00', 0x2, 0x46, &(0x7f00000001c0)=""/70, 0x40f00, 0x10, '\x00', r3, 0x25, r4, 0x8, &(0x7f0000000380)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x8, 0xa, 0x6}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000400)=[r1, r1], &(0x7f0000000440)=[{0x3, 0x2, 0x3, 0x4}, {0x0, 0x1, 0x1, 0xb}, {0x3, 0x4, 0x7, 0x9}, {0x1, 0x1, 0x6, 0x4}], 0x10, 0x3}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:02 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:37:02 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000002c0)={@empty, 0x0}, &(0x7f0000000300)=0x14) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000340), 0x10000, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x10, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc}, [@generic={0x80, 0x8, 0x0, 0xf320, 0x80000}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}]}, &(0x7f0000000180)='GPL\x00', 0x2, 0x46, &(0x7f00000001c0)=""/70, 0x40f00, 0x10, '\x00', r3, 0x25, r4, 0x8, &(0x7f0000000380)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x8, 0xa, 0x6}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000400)=[r1, r1], &(0x7f0000000440)=[{0x3, 0x2, 0x3, 0x4}, {0x0, 0x1, 0x1, 0xb}, {0x3, 0x4, 0x7, 0x9}, {0x1, 0x1, 0x6, 0x4}], 0x10, 0x3}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:02 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:02 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x3, 0x7, 0x1, 0x4}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:02 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:02 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x3, 0x7, 0x1, 0x4}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:03 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:03 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x3, 0x7, 0x1, 0x4}) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:03 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) 02:37:03 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) 02:37:03 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, 0x0) r3 = memfd_create(&(0x7f0000000180)='[}})\x00', 0x4) r4 = memfd_create(&(0x7f00000001c0)='&\xa0\x00', 0x7) r5 = memfd_create(&(0x7f0000000200)='\x00', 0x4) r6 = memfd_create(&(0x7f00000002c0)='$^\x00', 0x6) r7 = memfd_create(&(0x7f0000000300)='}+}r.-\x00', 0x0) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000006000000", @ANYRES32=r3, @ANYBLOB="00000000000000000100"/20, @ANYRES32=r4, @ANYBLOB="0000000000f0ffffffffffff0000000000000100", @ANYRES32=r5, @ANYBLOB="0000000000f0ffffffffffff0000000000000000", @ANYRES32, @ANYBLOB="000000000030ffffffffffff0000000100000000", @ANYRES32=r6, @ANYBLOB="0000000000000000000000000000000000000100", @ANYRES32=r7, @ANYBLOB="00000000000000000000000000f0ffff00000000"]) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000400)=[0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f00000000c0)={0x0, r8, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETFB2(0xffffffffffffffff, 0xc06864ce, &(0x7f0000000100)={r9, 0x600, 0x6, 0x0, 0x1, [], [0x3, 0x9, 0x2, 0x6], [0x7e, 0xfffffff7, 0x1000, 0x7ff], [0x9, 0x1, 0x5, 0x3f]}) 02:37:03 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, 0x0) (async, rerun: 64) r3 = memfd_create(&(0x7f0000000180)='[}})\x00', 0x4) (async, rerun: 64) r4 = memfd_create(&(0x7f00000001c0)='&\xa0\x00', 0x7) (async) r5 = memfd_create(&(0x7f0000000200)='\x00', 0x4) r6 = memfd_create(&(0x7f00000002c0)='$^\x00', 0x6) r7 = memfd_create(&(0x7f0000000300)='}+}r.-\x00', 0x0) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000006000000", @ANYRES32=r3, @ANYBLOB="00000000000000000100"/20, @ANYRES32=r4, @ANYBLOB="0000000000f0ffffffffffff0000000000000100", @ANYRES32=r5, @ANYBLOB="0000000000f0ffffffffffff0000000000000000", @ANYRES32, @ANYBLOB="000000000030ffffffffffff0000000100000000", @ANYRES32=r6, @ANYBLOB="0000000000000000000000000000000000000100", @ANYRES32=r7, @ANYBLOB="00000000000000000000000000f0ffff00000000"]) (async) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000400)=[0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f00000000c0)={0x0, r8, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETFB2(0xffffffffffffffff, 0xc06864ce, &(0x7f0000000100)={r9, 0x600, 0x6, 0x0, 0x1, [], [0x3, 0x9, 0x2, 0x6], [0x7e, 0xfffffff7, 0x1000, 0x7ff], [0x9, 0x1, 0x5, 0x3f]}) 02:37:03 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) 02:37:03 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:37:03 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, 0x0) (async) r3 = memfd_create(&(0x7f0000000180)='[}})\x00', 0x4) r4 = memfd_create(&(0x7f00000001c0)='&\xa0\x00', 0x7) (async) r5 = memfd_create(&(0x7f0000000200)='\x00', 0x4) (async) r6 = memfd_create(&(0x7f00000002c0)='$^\x00', 0x6) (async) r7 = memfd_create(&(0x7f0000000300)='}+}r.-\x00', 0x0) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000006000000", @ANYRES32=r3, @ANYBLOB="00000000000000000100"/20, @ANYRES32=r4, @ANYBLOB="0000000000f0ffffffffffff0000000000000100", @ANYRES32=r5, @ANYBLOB="0000000000f0ffffffffffff0000000000000000", @ANYRES32, @ANYBLOB="000000000030ffffffffffff0000000100000000", @ANYRES32=r6, @ANYBLOB="0000000000000000000000000000000000000100", @ANYRES32=r7, @ANYBLOB="00000000000000000000000000f0ffff00000000"]) (async) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000400)=[0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f00000000c0)={0x0, r8, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETFB2(0xffffffffffffffff, 0xc06864ce, &(0x7f0000000100)={r9, 0x600, 0x6, 0x0, 0x1, [], [0x3, 0x9, 0x2, 0x6], [0x7e, 0xfffffff7, 0x1000, 0x7ff], [0x9, 0x1, 0x5, 0x3f]}) 02:37:04 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:37:04 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:37:04 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 02:37:04 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x13, &(0x7f0000000100)={@local, 0x0}, &(0x7f0000000140)=0x14) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000580)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0xcfbb, 0x0}, 0x8) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020000000085000000a9ac65cf35054229796660f60e6642bf89082d7df7a260fd63ec0e3cadd1dc96431680d52ed55dce24c237e9008bd8dc24db43e536ac4bcf89df678d3dc3bb6364869bd42f7ad648f9848d42d99bd033263749acf1615fc826587f132c7e76db18926f1ea9db424ed6d62bbdf5b1f8d3bc71102d63c2", @ANYRES32=r0, @ANYBLOB="00ff9500000020000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41100, 0x32, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x5, 0xb, 0x85ad, 0x9f3}, 0x10, r3, 0x0, 0x9, &(0x7f0000000200)=[r0], &(0x7f00000002c0)=[{0x1, 0x4, 0xf, 0x8}, {0x0, 0x2, 0x0, 0x6}, {0x0, 0x1, 0x10, 0x9}, {0x4, 0x5, 0xb, 0x9}, {0x4, 0x2, 0xd, 0x5}, {0x0, 0x1, 0xf}, {0x0, 0x2, 0xa}, {0x2, 0x1, 0x3, 0x7}, {0x4, 0x3, 0x8, 0x8}], 0x10, 0x3f}, 0x90) clock_gettime(0x2, &(0x7f0000000040)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r4, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000740)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}], 0x8, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80)=r3, 0x4) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0xedd, 0x0, r0, 0x72f, '\x00', r1, 0xffffffffffffffff, 0x4}, 0x48) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x10001, 0x0, r0, 0xf3, '\x00', r1, 0xffffffffffffffff, 0x3}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=@base={0x15, 0x55, 0x2, 0xffff7fff, 0x2000, r5, 0x7ab32b7a, '\x00', r1, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d40)=@bpf_lsm={0x1d, 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000005000000000000003f00e6862989a120410000b7080000000000005b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000640)='GPL\x00', 0xffff, 0x72, &(0x7f00000006c0)=""/114, 0x40f00, 0xee294912656cb914, '\x00', r6, 0x1b, r7, 0x8, &(0x7f0000000ac0)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000c80)=[r5, r5, r8, r9, r5, r10, r0], &(0x7f0000000cc0)=[{0x4, 0x3, 0xf, 0x2}, {0x1, 0x2, 0x2, 0x7}, {0x5, 0x5, 0x6, 0x6}, {0x3, 0x4, 0x3, 0xc}, {0x5, 0x2, 0x1, 0xc}], 0x10, 0x6}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r5}, 0x18) 02:37:04 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 02:37:04 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 02:37:04 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x13, &(0x7f0000000100)={@local, 0x0}, &(0x7f0000000140)=0x14) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000580)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0xcfbb, 0x0}, 0x8) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020000000085000000a9ac65cf35054229796660f60e6642bf89082d7df7a260fd63ec0e3cadd1dc96431680d52ed55dce24c237e9008bd8dc24db43e536ac4bcf89df678d3dc3bb6364869bd42f7ad648f9848d42d99bd033263749acf1615fc826587f132c7e76db18926f1ea9db424ed6d62bbdf5b1f8d3bc71102d63c2", @ANYRES32=r0, @ANYBLOB="00ff9500000020000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41100, 0x32, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x5, 0xb, 0x85ad, 0x9f3}, 0x10, r3, 0x0, 0x9, &(0x7f0000000200)=[r0], &(0x7f00000002c0)=[{0x1, 0x4, 0xf, 0x8}, {0x0, 0x2, 0x0, 0x6}, {0x0, 0x1, 0x10, 0x9}, {0x4, 0x5, 0xb, 0x9}, {0x4, 0x2, 0xd, 0x5}, {0x0, 0x1, 0xf}, {0x0, 0x2, 0xa}, {0x2, 0x1, 0x3, 0x7}, {0x4, 0x3, 0x8, 0x8}], 0x10, 0x3f}, 0x90) (async) clock_gettime(0x2, &(0x7f0000000040)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r4, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000740)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}], 0x8, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) (async) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80)=r3, 0x4) (async) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0xedd, 0x0, r0, 0x72f, '\x00', r1, 0xffffffffffffffff, 0x4}, 0x48) (async) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x10001, 0x0, r0, 0xf3, '\x00', r1, 0xffffffffffffffff, 0x3}, 0x48) (async, rerun: 32) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=@base={0x15, 0x55, 0x2, 0xffff7fff, 0x2000, r5, 0x7ab32b7a, '\x00', r1, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x48) (rerun: 32) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d40)=@bpf_lsm={0x1d, 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000005000000000000003f00e6862989a120410000b7080000000000005b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000640)='GPL\x00', 0xffff, 0x72, &(0x7f00000006c0)=""/114, 0x40f00, 0xee294912656cb914, '\x00', r6, 0x1b, r7, 0x8, &(0x7f0000000ac0)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000c80)=[r5, r5, r8, r9, r5, r10, r0], &(0x7f0000000cc0)=[{0x4, 0x3, 0xf, 0x2}, {0x1, 0x2, 0x2, 0x7}, {0x5, 0x5, 0x6, 0x6}, {0x3, 0x4, 0x3, 0xc}, {0x5, 0x2, 0x1, 0xc}], 0x10, 0x6}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r5}, 0x18) 02:37:04 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={0x0, r1}, 0x18) 02:37:05 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={0x0, r1}, 0x18) 02:37:05 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x13, &(0x7f0000000100)={@local, 0x0}, &(0x7f0000000140)=0x14) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000580)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0xcfbb, 0x0}, 0x8) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020000000085000000a9ac65cf35054229796660f60e6642bf89082d7df7a260fd63ec0e3cadd1dc96431680d52ed55dce24c237e9008bd8dc24db43e536ac4bcf89df678d3dc3bb6364869bd42f7ad648f9848d42d99bd033263749acf1615fc826587f132c7e76db18926f1ea9db424ed6d62bbdf5b1f8d3bc71102d63c2", @ANYRES32=r0, @ANYBLOB="00ff9500000020000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41100, 0x32, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x5, 0xb, 0x85ad, 0x9f3}, 0x10, r3, 0x0, 0x9, &(0x7f0000000200)=[r0], &(0x7f00000002c0)=[{0x1, 0x4, 0xf, 0x8}, {0x0, 0x2, 0x0, 0x6}, {0x0, 0x1, 0x10, 0x9}, {0x4, 0x5, 0xb, 0x9}, {0x4, 0x2, 0xd, 0x5}, {0x0, 0x1, 0xf}, {0x0, 0x2, 0xa}, {0x2, 0x1, 0x3, 0x7}, {0x4, 0x3, 0x8, 0x8}], 0x10, 0x3f}, 0x90) (async) clock_gettime(0x2, &(0x7f0000000040)) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r4, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000740)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}], 0x8, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) (async) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a80)=r3, 0x4) (async) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0xedd, 0x0, r0, 0x72f, '\x00', r1, 0xffffffffffffffff, 0x4}, 0x48) (async) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x10001, 0x0, r0, 0xf3, '\x00', r1, 0xffffffffffffffff, 0x3}, 0x48) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=@base={0x15, 0x55, 0x2, 0xffff7fff, 0x2000, r5, 0x7ab32b7a, '\x00', r1, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d40)=@bpf_lsm={0x1d, 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000005000000000000003f00e6862989a120410000b7080000000000005b8af8ff00000000b7080000080000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000640)='GPL\x00', 0xffff, 0x72, &(0x7f00000006c0)=""/114, 0x40f00, 0xee294912656cb914, '\x00', r6, 0x1b, r7, 0x8, &(0x7f0000000ac0)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000c80)=[r5, r5, r8, r9, r5, r10, r0], &(0x7f0000000cc0)=[{0x4, 0x3, 0xf, 0x2}, {0x1, 0x2, 0x2, 0x7}, {0x5, 0x5, 0x6, 0x6}, {0x3, 0x4, 0x3, 0xc}, {0x5, 0x2, 0x1, 0xc}], 0x10, 0x6}, 0x90) (async, rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r5}, 0x18) (rerun: 32) 02:37:05 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={0x0, r1}, 0x18) 02:37:05 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) 02:37:05 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r1, 0x4) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0, r2, 0x0, 0x0, 0x20}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) 02:37:05 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) 02:37:05 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r1, 0x4) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0, r2, 0x0, 0x0, 0x20}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) 02:37:05 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) 02:37:06 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r1, 0x4) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0, r2, 0x0, 0x0, 0x20}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) 02:37:06 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (fail_nth: 1) 02:37:06 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x800, 0x200000}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) [ 9426.337300][T17080] FAULT_INJECTION: forcing a failure. [ 9426.337300][T17080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 9426.337894][T17080] CPU: 1 PID: 17080 Comm: syz-executor.1 Not tainted 6.8.0-rc1-syzkaller #0 [ 9426.338643][T17080] Hardware name: ARM-Versatile Express [ 9426.338753][T17080] Backtrace: [ 9426.339019][T17080] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9426.339409][T17080] r7:00000006 r6:ecf89ea0 r5:20000013 r4:81fbd1a4 [ 9426.339643][T17080] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9426.339954][T17080] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9426.340586][T17080] r5:00000000 r4:8273f9b0 [ 9426.340748][T17080] [<81852f28>] (dump_stack) from [<808849dc>] (should_fail_ex+0x18c/0x1dc) [ 9426.341252][T17080] [<80884850>] (should_fail_ex) from [<80884a40>] (should_fail+0x14/0x18) [ 9426.341499][T17080] r6:ecf89ea0 r5:00000018 r4:00000000 [ 9426.341645][T17080] [<80884a2c>] (should_fail) from [<80884a60>] (should_fail_usercopy+0x1c/0x20) [ 9426.342023][T17080] [<80884a44>] (should_fail_usercopy) from [<803926a8>] (__sys_bpf+0xbc/0x2104) [ 9426.342891][T17080] [<803925ec>] (__sys_bpf) from [<80394c6c>] (sys_bpf+0x2c/0x48) [ 9426.344278][T17080] r10:00000182 r9:8510c800 r8:80200288 r7:00000182 r6:0004f070 r5:00000000 [ 9426.345180][T17080] r4:00000000 [ 9426.345282][T17080] [<80394c40>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9426.345508][T17080] Exception stack(0xecf89fa8 to 0xecf89ff0) [ 9426.345616][T17080] 9fa0: 00000000 00000000 00000006 20000080 00000018 00000000 [ 9426.345804][T17080] 9fc0: 00000000 00000000 0004f070 00000182 7e9b7326 7e9b7327 003d0f00 76b320fc [ 9426.345975][T17080] 9fe0: 76b31f08 76b31ef8 000167e8 00050bd0 02:37:06 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x800, 0x200000}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x800, 0x200000}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) (async) 02:37:06 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (fail_nth: 2) [ 9426.596137][T17086] FAULT_INJECTION: forcing a failure. [ 9426.596137][T17086] name failslab, interval 1, probability 0, space 0, times 0 [ 9426.596823][T17086] CPU: 0 PID: 17086 Comm: syz-executor.1 Not tainted 6.8.0-rc1-syzkaller #0 [ 9426.597037][T17086] Hardware name: ARM-Versatile Express 02:37:06 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x800, 0x200000}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x800, 0x200000}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) (async) [ 9426.597446][T17086] Backtrace: [ 9426.597732][T17086] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9426.598034][T17086] r7:00000cc0 r6:8510ec00 r5:20000013 r4:81fbd1a4 [ 9426.598379][T17086] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9426.599195][T17086] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9426.599783][T17086] r5:00000000 r4:8270f4d4 [ 9426.600183][T17086] [<81852f28>] (dump_stack) from [<808849dc>] (should_fail_ex+0x18c/0x1dc) [ 9426.600744][T17086] [<80884850>] (should_fail_ex) from [<804c1464>] (__should_failslab+0x6c/0x80) [ 9426.601192][T17086] r6:8510ec00 r5:00000cc0 r4:82ca8a80 [ 9426.601520][T17086] [<804c13f8>] (__should_failslab) from [<804a5e30>] (should_failslab+0x10/0x20) [ 9426.602094][T17086] [<804a5e20>] (should_failslab) from [<804a6c04>] (kmem_cache_alloc+0x50/0x358) [ 9426.602414][T17086] [<804a6bb4>] (kmem_cache_alloc) from [<804f7cc4>] (getname_flags.part.0+0x2c/0x170) [ 9426.602807][T17086] r10:00000000 r9:8218f6c8 r8:00000000 r7:00000000 r6:20000140 r5:00000000 [ 9426.603019][T17086] r4:20000140 [ 9426.603384][T17086] [<804f7c98>] (getname_flags.part.0) from [<804fe04c>] (getname_flags+0x44/0x58) [ 9426.603766][T17086] r10:00000000 r9:00000018 r8:00000002 r7:00000000 r6:00000000 r5:00000000 [ 9426.604249][T17086] r4:20000140 r3:00000000 [ 9426.604572][T17086] [<804fe008>] (getname_flags) from [<804fe0d4>] (user_path_create+0x28/0x54) [ 9426.605245][T17086] r7:00000000 r6:ecf9de3c r5:ffffff9c r4:9e2e2200 [ 9426.605675][T17086] [<804fe0ac>] (user_path_create) from [<803b8614>] (bpf_obj_pin_user+0x60/0x1b4) [ 9426.606068][T17086] r7:20000140 r6:00000000 r5:ffffff9c r4:9e2e2200 [ 9426.606363][T17086] [<803b85b4>] (bpf_obj_pin_user) from [<803934dc>] (__sys_bpf+0xef0/0x2104) [ 9426.606726][T17086] r8:20000080 r7:00000006 r6:ecf9dea0 r5:00000018 r4:00000000 [ 9426.606927][T17086] [<803925ec>] (__sys_bpf) from [<80394c6c>] (sys_bpf+0x2c/0x48) [ 9426.608350][T17086] r10:00000182 r9:8510ec00 r8:80200288 r7:00000182 r6:0004f070 r5:00000000 [ 9426.608886][T17086] r4:00000000 [ 9426.609027][T17086] [<80394c40>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9426.609615][T17086] Exception stack(0xecf9dfa8 to 0xecf9dff0) [ 9426.609919][T17086] dfa0: 00000000 00000000 00000006 20000080 00000018 00000000 [ 9426.610165][T17086] dfc0: 00000000 00000000 0004f070 00000182 7e9b7326 7e9b7327 003d0f00 76b320fc [ 9426.610386][T17086] dfe0: 76b31f08 76b31ef8 000167e8 00050bd0 02:37:06 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (fail_nth: 3) [ 9426.807973][T17090] FAULT_INJECTION: forcing a failure. [ 9426.807973][T17090] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 9426.816075][T17090] CPU: 1 PID: 17090 Comm: syz-executor.1 Not tainted 6.8.0-rc1-syzkaller #0 [ 9426.817345][T17090] Hardware name: ARM-Versatile Express [ 9426.817685][T17090] Backtrace: [ 9426.818054][T17090] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9426.819618][T17090] r7:82edf010 r6:20000140 r5:20000113 r4:81fbd1a4 [ 9426.820007][T17090] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9426.822247][T17090] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9426.825237][T17090] r5:00000000 r4:8273f9b0 [ 9426.825396][T17090] [<81852f28>] (dump_stack) from [<808849dc>] (should_fail_ex+0x18c/0x1dc) [ 9426.825676][T17090] [<80884850>] (should_fail_ex) from [<80884a40>] (should_fail+0x14/0x18) [ 9426.826054][T17090] r6:20000140 r5:00000000 r4:82edf000 [ 9426.826238][T17090] [<80884a2c>] (should_fail) from [<80884a60>] (should_fail_usercopy+0x1c/0x20) [ 9426.826483][T17090] [<80884a44>] (should_fail_usercopy) from [<8088a524>] (strncpy_from_user+0x1c/0x150) [ 9426.826733][T17090] [<8088a508>] (strncpy_from_user) from [<804f7ce0>] (getname_flags.part.0+0x48/0x170) [ 9426.827013][T17090] r10:00000000 r9:8218f6c8 r8:00000000 r7:00000000 r6:20000140 r5:00000000 [ 9426.827251][T17090] r4:82edf000 r3:909b4800 [ 9426.827408][T17090] [<804f7c98>] (getname_flags.part.0) from [<804fe04c>] (getname_flags+0x44/0x58) [ 9426.828626][T17090] r10:00000000 r9:00000018 r8:00000002 r7:00000000 r6:00000000 r5:00000000 [ 9426.828915][T17090] r4:20000140 r3:00000000 [ 9426.829065][T17090] [<804fe008>] (getname_flags) from [<804fe0d4>] (user_path_create+0x28/0x54) [ 9426.829369][T17090] r7:00000000 r6:ecf85e3c r5:ffffff9c r4:9e2e2800 [ 9426.829590][T17090] [<804fe0ac>] (user_path_create) from [<803b8614>] (bpf_obj_pin_user+0x60/0x1b4) [ 9426.831251][T17090] r7:20000140 r6:00000000 r5:ffffff9c r4:9e2e2800 [ 9426.832228][T17090] [<803b85b4>] (bpf_obj_pin_user) from [<803934dc>] (__sys_bpf+0xef0/0x2104) [ 9426.833569][T17090] r8:20000080 r7:00000006 r6:ecf85ea0 r5:00000018 r4:00000000 [ 9426.835321][T17090] [<803925ec>] (__sys_bpf) from [<80394c6c>] (sys_bpf+0x2c/0x48) [ 9426.835629][T17090] r10:00000182 r9:909b4800 r8:80200288 r7:00000182 r6:0004f070 r5:00000000 [ 9426.835962][T17090] r4:00000000 [ 9426.836099][T17090] [<80394c40>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9426.836388][T17090] Exception stack(0xecf85fa8 to 0xecf85ff0) [ 9426.837293][T17090] 5fa0: 00000000 00000000 00000006 20000080 00000018 00000000 [ 9426.843591][T17090] 5fc0: 00000000 00000000 0004f070 00000182 7e9b7326 7e9b7327 003d0f00 76b320fc [ 9426.845707][T17090] 5fe0: 76b31f08 76b31ef8 000167e8 00050bd0 02:37:06 executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x40, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x2}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r2}, 0x18) 02:37:06 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (fail_nth: 4) [ 9427.348229][T17095] FAULT_INJECTION: forcing a failure. [ 9427.348229][T17095] name failslab, interval 1, probability 0, space 0, times 0 [ 9427.348966][T17095] CPU: 0 PID: 17095 Comm: syz-executor.1 Not tainted 6.8.0-rc1-syzkaller #0 [ 9427.349161][T17095] Hardware name: ARM-Versatile Express [ 9427.349380][T17095] Backtrace: [ 9427.349575][T17095] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9427.349886][T17095] r7:00000cc0 r6:909b2400 r5:20000013 r4:81fbd1a4 [ 9427.350037][T17095] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9427.350218][T17095] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9427.350399][T17095] r5:00000000 r4:8270f4d4 [ 9427.350550][T17095] [<81852f28>] (dump_stack) from [<808849dc>] (should_fail_ex+0x18c/0x1dc) [ 9427.350994][T17095] [<80884850>] (should_fail_ex) from [<804c1464>] (__should_failslab+0x6c/0x80) [ 9427.351262][T17095] r6:909b2400 r5:00000cc0 r4:82ca8b40 [ 9427.351383][T17095] [<804c13f8>] (__should_failslab) from [<804a5e30>] (should_failslab+0x10/0x20) [ 9427.351929][T17095] [<804a5e20>] (should_failslab) from [<804a6f60>] (kmem_cache_alloc_lru+0x54/0x4a0) [ 9427.352118][T17095] [<804a6f0c>] (kmem_cache_alloc_lru) from [<805061a8>] (__d_alloc+0x30/0x228) [ 9427.352316][T17095] r10:00000000 r9:909b2400 r8:8218f6bc r7:84099000 r6:ecf81cf8 r5:ecf81cf8 [ 9427.352521][T17095] r4:86335ab0 [ 9427.352593][T17095] [<80506178>] (__d_alloc) from [<805063b8>] (d_alloc+0x18/0x68) [ 9427.352955][T17095] r9:909b2400 r8:0cc5e5d5 r7:00000010 r6:ecf81cf8 r5:86335ab0 r4:86335ab0 [ 9427.353104][T17095] [<805063a0>] (d_alloc) from [<80509664>] (d_alloc_parallel+0x58/0x490) [ 9427.353539][T17095] r7:00000010 r6:ecf81cf8 r5:86335ab0 r4:00000267 [ 9427.353797][T17095] [<8050960c>] (d_alloc_parallel) from [<804f7e64>] (__lookup_slow+0x5c/0x134) [ 9427.354042][T17095] r10:00000000 r9:82e93018 r8:848980d8 r7:00000010 r6:ecf81cf8 r5:86335ab0 [ 9427.354310][T17095] r4:86335ab0 [ 9427.354389][T17095] [<804f7e08>] (__lookup_slow) from [<804fc1a8>] (walk_component+0x104/0x170) [ 9427.354673][T17095] r8:00000010 r7:00000002 r6:ecf81cf0 r5:84898160 r4:86335ab0 [ 9427.354950][T17095] [<804fc0a4>] (walk_component) from [<804fc478>] (link_path_walk.part.0.constprop.0+0x264/0x390) [ 9427.355513][T17095] r9:82e93018 r8:2f2f2f2f r7:d0d0d0d0 r6:ecf81cf0 r5:fefefeff r4:80808080 [ 9427.355720][T17095] [<804fc214>] (link_path_walk.part.0.constprop.0) from [<804fc5e4>] (path_parentat+0x40/0x80) [ 9427.356173][T17095] r10:00000000 r9:ffffff9c r8:00000000 r7:ecf81dd8 r6:ecf81e3c r5:ecf81cf0 [ 9427.356337][T17095] r4:82e93010 [ 9427.356391][T17095] [<804fc5a4>] (path_parentat) from [<804fc6f4>] (__filename_parentat+0xd0/0x1b4) [ 9427.356584][T17095] r7:ecf81dd8 r6:ecf81e3c r5:82e93000 r4:909b2400 [ 9427.356740][T17095] [<804fc624>] (__filename_parentat) from [<804fc974>] (filename_create+0x60/0x198) [ 9427.356910][T17095] r10:00000000 r9:00000000 r8:00000002 r7:00000000 r6:ecf81dd8 r5:ecf81e3c [ 9427.357047][T17095] r4:82e93000 [ 9427.357130][T17095] [<804fc914>] (filename_create) from [<804fe0ec>] (user_path_create+0x40/0x54) [ 9427.357518][T17095] r9:00000018 r8:00000002 r7:00000000 r6:ecf81e3c r5:ffffff9c r4:82e93000 [ 9427.357705][T17095] [<804fe0ac>] (user_path_create) from [<803b8614>] (bpf_obj_pin_user+0x60/0x1b4) [ 9427.357900][T17095] r7:20000140 r6:00000000 r5:ffffff9c r4:a846de00 [ 9427.358022][T17095] [<803b85b4>] (bpf_obj_pin_user) from [<803934dc>] (__sys_bpf+0xef0/0x2104) [ 9427.358385][T17095] r8:20000080 r7:00000006 r6:ecf81ea0 r5:00000018 r4:00000000 [ 9427.358556][T17095] [<803925ec>] (__sys_bpf) from [<80394c6c>] (sys_bpf+0x2c/0x48) [ 9427.358817][T17095] r10:00000182 r9:909b2400 r8:80200288 r7:00000182 r6:0004f070 r5:00000000 [ 9427.359040][T17095] r4:00000000 [ 9427.359190][T17095] [<80394c40>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9427.359429][T17095] Exception stack(0xecf81fa8 to 0xecf81ff0) [ 9427.359615][T17095] 1fa0: 00000000 00000000 00000006 20000080 00000018 00000000 [ 9427.360214][T17095] 1fc0: 00000000 00000000 0004f070 00000182 7e9b7326 7e9b7327 003d0f00 76b320fc [ 9427.360694][T17095] 1fe0: 76b31f08 76b31ef8 000167e8 00050bd0 02:37:07 executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x40, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x2}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r2}, 0x18) 02:37:07 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (fail_nth: 5) [ 9427.659498][T17099] FAULT_INJECTION: forcing a failure. [ 9427.659498][T17099] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 9427.659927][T17099] CPU: 1 PID: 17099 Comm: syz-executor.1 Not tainted 6.8.0-rc1-syzkaller #0 [ 9427.660224][T17099] Hardware name: ARM-Versatile Express [ 9427.660385][T17099] Backtrace: [ 9427.660506][T17099] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9427.660734][T17099] r7:00000000 r6:00000000 r5:20000013 r4:81fbd1a4 [ 9427.660869][T17099] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9427.661035][T17099] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9427.661194][T17099] r5:00000000 r4:8273f9b0 [ 9427.661289][T17099] [<81852f28>] (dump_stack) from [<808849dc>] (should_fail_ex+0x18c/0x1dc) [ 9427.661477][T17099] [<80884850>] (should_fail_ex) from [<80884a40>] (should_fail+0x14/0x18) [ 9427.661674][T17099] r6:00000000 r5:ecf69f68 r4:00000002 [ 9427.661778][T17099] [<80884a2c>] (should_fail) from [<80884a60>] (should_fail_usercopy+0x1c/0x20) [ 9427.661945][T17099] [<80884a44>] (should_fail_usercopy) from [<8051f144>] (simple_read_from_buffer+0x8c/0x118) [ 9427.662316][T17099] [<8051f0b8>] (simple_read_from_buffer) from [<80590a7c>] (proc_fail_nth_read+0xb8/0x100) [ 9427.662672][T17099] r9:805909c4 r8:00000002 r7:ecf69f68 r6:0000000f r5:76b31f78 r4:909b6000 [ 9427.663175][T17099] [<805909c4>] (proc_fail_nth_read) from [<804e8ee0>] (vfs_read+0x98/0x314) [ 9427.663436][T17099] r8:76b31f78 r7:ecf69f68 r6:909b6000 r5:0000000f r4:85ddd3c0 [ 9427.663554][T17099] [<804e8e48>] (vfs_read) from [<804e9b58>] (ksys_read+0x78/0xf8) [ 9427.663794][T17099] r10:00000003 r9:909b6000 r8:80200288 r7:00000000 r6:00000000 r5:85ddd3c0 [ 9427.664223][T17099] r4:85ddd3c3 [ 9427.664337][T17099] [<804e9ae0>] (ksys_read) from [<804e9be8>] (sys_read+0x10/0x14) [ 9427.664594][T17099] r7:00000003 r6:00000004 r5:76b31f78 r4:0000000f [ 9427.664807][T17099] [<804e9bd8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9427.664943][T17099] Exception stack(0xecf69fa8 to 0xecf69ff0) [ 9427.665117][T17099] 9fa0: 0000000f 76b31f78 00000004 76b31f78 0000000f 00000000 [ 9427.665261][T17099] 9fc0: 0000000f 76b31f78 00000004 00000003 7e9b7326 7e9b7327 003d0f00 76b320fc [ 9427.665660][T17099] 9fe0: 0000005c 76b31f18 00091164 0004ef94 02:37:07 executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x40, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x2}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r2}, 0x18) 02:37:07 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f00000003c0)=""/3, 0x0, 0x3, 0x3}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r2}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r0, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x0, '\x00', r3, r4, 0x0, 0x3, 0x2}, 0x48) 02:37:07 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f00000003c0)=""/3, 0x0, 0x3, 0x3}, 0x20) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r2}, 0x18) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r0, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x0, '\x00', r3, r4, 0x0, 0x3, 0x2}, 0x48) 02:37:08 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={@ifindex, 0xf0f762960ae287d6, 0x1, 0x80000000, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)=@o_path={&(0x7f0000000040)='./file0/file0\x00', r0, 0x4000, r2}, 0x18) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100001c0000000600000003000000000000070000000003000000000000010000001704002e612e3000000000"], &(0x7f0000000140)=""/183, 0x3a, 0xb7, 0x1}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x8, 0xbe, 0x4, 0x22b, r1, 0x3, '\x00', 0x0, r4, 0x5, 0x3, 0x1, 0xa}, 0x48) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000740)={@empty, 0x0}, &(0x7f0000000780)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x14f3, 0x0, r1, 0x1, '\x00', r7, r4, 0x1, 0x0, 0x3}, 0x48) ioctl$RTC_IRQP_READ(r6, 0x8004700b, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000480)={@mcast1, 0x0}, &(0x7f00000004c0)=0x14) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="9feb1100180000060000000028000010280000000900080000000000000000003e4d27310c0000000000000201af87c978128f67aa30006100c8b48cbc2be527a8e7c68d7f2c3186cf84f34c8a4c8b61da3a46d01e58ee599ee0d91e1641eed343b0f8706e77d5686dda2402b680fdf5cb019ae7471870a600000000000000000000000000000000f44fd0a77850d7b18c9a"], &(0x7f0000000580)=""/48, 0x49, 0x30, 0x1, 0x2}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x19, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x419}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x4, 0x0, 0x9, 0x3, 0x9, 0x10, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='syzkaller\x00', 0x3f, 0xe, &(0x7f0000000440)=""/14, 0x40f00, 0x9, '\x00', r8, 0x25, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x0, 0xfeca, 0x20, 0x1}, 0x10}, 0x90) 02:37:08 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f00000003c0)=""/3, 0x0, 0x3, 0x3}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r2}, 0x18) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r0, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x0, '\x00', r3, r4, 0x0, 0x3, 0x2}, 0x48) [ 9428.250347][ T29] audit: type=1400 audit(9428.190:10162): avc: denied { getopt } for pid=17108 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 02:37:08 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={@ifindex, 0xf0f762960ae287d6, 0x1, 0x80000000, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)=@o_path={&(0x7f0000000040)='./file0/file0\x00', r0, 0x4000, r2}, 0x18) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100001c0000000600000003000000000000070000000003000000000000010000001704002e612e3000000000"], &(0x7f0000000140)=""/183, 0x3a, 0xb7, 0x1}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x8, 0xbe, 0x4, 0x22b, r1, 0x3, '\x00', 0x0, r4, 0x5, 0x3, 0x1, 0xa}, 0x48) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000740)={@empty, 0x0}, &(0x7f0000000780)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x14f3, 0x0, r1, 0x1, '\x00', r7, r4, 0x1, 0x0, 0x3}, 0x48) ioctl$RTC_IRQP_READ(r6, 0x8004700b, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000480)={@mcast1, 0x0}, &(0x7f00000004c0)=0x14) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="9feb1100180000060000000028000010280000000900080000000000000000003e4d27310c0000000000000201af87c978128f67aa30006100c8b48cbc2be527a8e7c68d7f2c3186cf84f34c8a4c8b61da3a46d01e58ee599ee0d91e1641eed343b0f8706e77d5686dda2402b680fdf5cb019ae7471870a600000000000000000000000000000000f44fd0a77850d7b18c9a"], &(0x7f0000000580)=""/48, 0x49, 0x30, 0x1, 0x2}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x19, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x419}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x4, 0x0, 0x9, 0x3, 0x9, 0x10, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='syzkaller\x00', 0x3f, 0xe, &(0x7f0000000440)=""/14, 0x40f00, 0x9, '\x00', r8, 0x25, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x0, 0xfeca, 0x20, 0x1}, 0x10}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={@ifindex, 0xf0f762960ae287d6, 0x1, 0x80000000, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)=@o_path={&(0x7f0000000040)='./file0/file0\x00', r0, 0x4000, r2}, 0x18) (async) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100001c0000000600000003000000000000070000000003000000000000010000001704002e612e3000000000"], &(0x7f0000000140)=""/183, 0x3a, 0xb7, 0x1}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x8, 0xbe, 0x4, 0x22b, r1, 0x3, '\x00', 0x0, r4, 0x5, 0x3, 0x1, 0xa}, 0x48) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000740)={@empty}, &(0x7f0000000780)=0x14) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x14f3, 0x0, r1, 0x1, '\x00', r7, r4, 0x1, 0x0, 0x3}, 0x48) (async) ioctl$RTC_IRQP_READ(r6, 0x8004700b, 0x0) (async) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000480)={@mcast1}, &(0x7f00000004c0)=0x14) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="9feb1100180000060000000028000010280000000900080000000000000000003e4d27310c0000000000000201af87c978128f67aa30006100c8b48cbc2be527a8e7c68d7f2c3186cf84f34c8a4c8b61da3a46d01e58ee599ee0d91e1641eed343b0f8706e77d5686dda2402b680fdf5cb019ae7471870a600000000000000000000000000000000f44fd0a77850d7b18c9a"], &(0x7f0000000580)=""/48, 0x49, 0x30, 0x1, 0x2}, 0x20) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x19, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x419}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x4, 0x0, 0x9, 0x3, 0x9, 0x10, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='syzkaller\x00', 0x3f, 0xe, &(0x7f0000000440)=""/14, 0x40f00, 0x9, '\x00', r8, 0x25, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x0, 0xfeca, 0x20, 0x1}, 0x10}, 0x90) (async) 02:37:08 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r1, 0xc01464a6, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, r1, 0x1, 0xffffffff}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r2}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x1, 0x400, 0x1, 0x1c0, r2, 0xea, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) 02:37:08 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r1, 0xc01464a6, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, r1, 0x1, 0xffffffff}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r2}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x1, 0x400, 0x1, 0x1c0, r2, 0xea, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) (async) openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETENCODER(r1, 0xc01464a6, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, r1, 0x1, 0xffffffff}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r2}, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x1, 0x400, 0x1, 0x1c0, r2, 0xea, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r3}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) (async) 02:37:08 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={@ifindex, 0xf0f762960ae287d6, 0x1, 0x80000000, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={@ifindex, 0xf0f762960ae287d6, 0x1, 0x80000000, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)=@o_path={&(0x7f0000000040)='./file0/file0\x00', r0, 0x4000, r2}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)=@o_path={&(0x7f0000000040)='./file0/file0\x00', r0, 0x4000, r2}, 0x18) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100001c0000000600000003000000000000070000000003000000000000010000001704002e612e3000000000"], &(0x7f0000000140)=""/183, 0x3a, 0xb7, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x8, 0xbe, 0x4, 0x22b, r1, 0x3, '\x00', 0x0, r4, 0x5, 0x3, 0x1, 0xa}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x8, 0xbe, 0x4, 0x22b, r1, 0x3, '\x00', 0x0, r4, 0x5, 0x3, 0x1, 0xa}, 0x48) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000740)={@empty, 0x0}, &(0x7f0000000780)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x14f3, 0x0, r1, 0x1, '\x00', r7, r4, 0x1, 0x0, 0x3}, 0x48) ioctl$RTC_IRQP_READ(r6, 0x8004700b, 0x0) (async) ioctl$RTC_IRQP_READ(r6, 0x8004700b, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000480)={@mcast1, 0x0}, &(0x7f00000004c0)=0x14) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="9feb1100180000060000000028000010280000000900080000000000000000003e4d27310c0000000000000201af87c978128f67aa30006100c8b48cbc2be527a8e7c68d7f2c3186cf84f34c8a4c8b61da3a46d01e58ee599ee0d91e1641eed343b0f8706e77d5686dda2402b680fdf5cb019ae7471870a600000000000000000000000000000000f44fd0a77850d7b18c9a"], &(0x7f0000000580)=""/48, 0x49, 0x30, 0x1, 0x2}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x19, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x419}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x4, 0x0, 0x9, 0x3, 0x9, 0x10, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='syzkaller\x00', 0x3f, 0xe, &(0x7f0000000440)=""/14, 0x40f00, 0x9, '\x00', r8, 0x25, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x0, 0xfeca, 0x20, 0x1}, 0x10}, 0x90) 02:37:08 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r1, 0xc01464a6, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, r1, 0x1, 0xffffffff}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r2}, 0x4) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x1, 0x400, 0x1, 0x1c0, r2, 0xea, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) 02:37:09 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = openat$cgroup_root(0xffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup=r2, 0x26, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 02:37:09 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:09 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r2 = openat$cgroup_root(0xffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup=r2, 0x26, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 02:37:09 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:09 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = openat$cgroup_root(0xffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup=r2, 0x26, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup=r2, 0x26, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 02:37:09 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) (async) 02:37:09 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x5, 0x88100) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc008641d, &(0x7f00000000c0)={0x0, &(0x7f0000000040)=""/4}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:10 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x10000}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x346}}]}, {0x0, [0x0, 0x2e, 0x2e, 0x2e]}}, &(0x7f0000000880)=""/4096, 0x36, 0x1000, 0x0, 0x200}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000440)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x219e, '\x00', r1, r2, 0x3, 0x2, 0x2}, 0x48) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDGETENTCNT(r3, 0x80045200, 0x0) write$nbd(r3, &(0x7f0000001880)=ANY=[@ANYBLOB="67446698010000000000040004000000128c6dcce926c10cbd63f6377d5db84e3b32094b8ac52e325c5e17b2ca957594192ad0c23ad1d27736a006756617a82575cd68b1662dd4af4f4f13c6971fc8bbecdfa3b94d27a16375948055be5be4f759b4a436755fc701201336fea7a7072b0ace05a5518360e85c2970df433bae75eeaf4a4a7fce605f69fe256e4b4c52e68bba286b391c3cc81a4bf6ea71f403a5c16bdee456df0999daba3e03ab9a0e43bc5561b6b5538947ef268c24eba65bb0bdaee6877f32e49389afe07e1d471a25d5670fe60f809fa779a37644d436cc146d47b2125abc9770d6f3d277e3b45009be570d4136ae1157454fe36c7ba67d3e64a819c1276448223c8a2ff58a20fdab5223adf6076b9640e69e6845fd24f0243f58d114cdcfcbd965704ed2fbef292d532c235ee96f325bf561e4b4b9f181a83a6a247c3f12d478cedf3318b841633201d240ec3da5141abab3d0c2150c9d24878c178701bbcbed08eab4b84926ea3737c2eca1633ae2bb1f85eccad32d1f85045575dabc1e387a88e9ee41f2c5c2ce9ec5eb195feb3fe12ba75b8d927e6ac277477aa217a3fe54"], 0x105) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000600)={0x1, 0x1, {0x1c, 0x20, 0x14, 0x17, 0x9, 0x101, 0x4, 0x107}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) 02:37:10 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x5, 0x88100) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc008641d, &(0x7f00000000c0)={0x0, &(0x7f0000000040)=""/4}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:10 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x10000}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x346}}]}, {0x0, [0x0, 0x2e, 0x2e, 0x2e]}}, &(0x7f0000000880)=""/4096, 0x36, 0x1000, 0x0, 0x200}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000440)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x219e, '\x00', r1, r2, 0x3, 0x2, 0x2}, 0x48) (async) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDGETENTCNT(r3, 0x80045200, 0x0) (async, rerun: 32) write$nbd(r3, &(0x7f0000001880)=ANY=[@ANYBLOB="67446698010000000000040004000000128c6dcce926c10cbd63f6377d5db84e3b32094b8ac52e325c5e17b2ca957594192ad0c23ad1d27736a006756617a82575cd68b1662dd4af4f4f13c6971fc8bbecdfa3b94d27a16375948055be5be4f759b4a436755fc701201336fea7a7072b0ace05a5518360e85c2970df433bae75eeaf4a4a7fce605f69fe256e4b4c52e68bba286b391c3cc81a4bf6ea71f403a5c16bdee456df0999daba3e03ab9a0e43bc5561b6b5538947ef268c24eba65bb0bdaee6877f32e49389afe07e1d471a25d5670fe60f809fa779a37644d436cc146d47b2125abc9770d6f3d277e3b45009be570d4136ae1157454fe36c7ba67d3e64a819c1276448223c8a2ff58a20fdab5223adf6076b9640e69e6845fd24f0243f58d114cdcfcbd965704ed2fbef292d532c235ee96f325bf561e4b4b9f181a83a6a247c3f12d478cedf3318b841633201d240ec3da5141abab3d0c2150c9d24878c178701bbcbed08eab4b84926ea3737c2eca1633ae2bb1f85eccad32d1f85045575dabc1e387a88e9ee41f2c5c2ce9ec5eb195feb3fe12ba75b8d927e6ac277477aa217a3fe54"], 0x105) (rerun: 32) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000600)={0x1, 0x1, {0x1c, 0x20, 0x14, 0x17, 0x9, 0x101, 0x4, 0x107}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) 02:37:10 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x5, 0x88100) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc008641d, &(0x7f00000000c0)={0x0, &(0x7f0000000040)=""/4}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) syz_open_dev$dri(&(0x7f0000000000), 0x5, 0x88100) (async) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc008641d, &(0x7f00000000c0)={0x0, &(0x7f0000000040)=""/4}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) 02:37:10 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x10000}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x346}}]}, {0x0, [0x0, 0x2e, 0x2e, 0x2e]}}, &(0x7f0000000880)=""/4096, 0x36, 0x1000, 0x0, 0x200}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000440)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x219e, '\x00', r1, r2, 0x3, 0x2, 0x2}, 0x48) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDGETENTCNT(r3, 0x80045200, 0x0) (async) write$nbd(r3, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], 0x105) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000600)={0x1, 0x1, {0x1c, 0x20, 0x14, 0x17, 0x9, 0x101, 0x4, 0x107}}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) 02:37:10 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000100)={&(0x7f0000000000)="9f3ebd56f87697eb3c1d79a1f0901b2f1a9c97679a061eeb2bd19b4c3df6ad4d04fce87962bbcd8e87525222717a5a9020f7fabd7f26fe1ba3773b5fa5", &(0x7f0000000180)=""/182, &(0x7f0000000040)="032a1129e8652b1f708c45836bfcb43e4c", &(0x7f00000000c0)="0d26be47d311736f01efb8375f727fe771c48b06a90096d6a690", 0x7e, r0}, 0x38) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:10 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1b, 0xfffffff7, 0x2, 0x0, 0x1094, r0, 0xc000, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:11 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000100)={&(0x7f0000000000)="9f3ebd56f87697eb3c1d79a1f0901b2f1a9c97679a061eeb2bd19b4c3df6ad4d04fce87962bbcd8e87525222717a5a9020f7fabd7f26fe1ba3773b5fa5", &(0x7f0000000180)=""/182, &(0x7f0000000040)="032a1129e8652b1f708c45836bfcb43e4c", &(0x7f00000000c0)="0d26be47d311736f01efb8375f727fe771c48b06a90096d6a690", 0x7e, r0}, 0x38) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:11 executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1b, 0xfffffff7, 0x2, 0x0, 0x1094, r0, 0xc000, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:11 executing program 1: openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000100)={&(0x7f0000000000)="9f3ebd56f87697eb3c1d79a1f0901b2f1a9c97679a061eeb2bd19b4c3df6ad4d04fce87962bbcd8e87525222717a5a9020f7fabd7f26fe1ba3773b5fa5", &(0x7f0000000180)=""/182, &(0x7f0000000040)="032a1129e8652b1f708c45836bfcb43e4c", &(0x7f00000000c0)="0d26be47d311736f01efb8375f727fe771c48b06a90096d6a690", 0x7e, r0}, 0x38) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:11 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1b, 0xfffffff7, 0x2, 0x0, 0x1094, r0, 0xc000, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1b, 0xfffffff7, 0x2, 0x0, 0x1094, r0, 0xc000, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x1}, 0x48) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) (async) 02:37:11 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x80000002, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f00000000c0), &(0x7f0000000180)=r2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:37:12 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x80000002, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f00000000c0), &(0x7f0000000180)=r2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x80000002, 0x3, 0x3}, 0x48) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f00000000c0), &(0x7f0000000180)=r2}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) (async) 02:37:12 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x80000002, 0x3, 0x3}, 0x48) (async) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f00000000c0), &(0x7f0000000180)=r2}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:37:12 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x9) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@private1}, &(0x7f0000000180)=0x14) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x34000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000100)) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfff, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r3}, 0x18) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f00000001c0)={"f9e788ef5f6efeb0a956de3ec29c5dc4", 0x0, 0x0, {0x5, 0x4}, {0x1216, 0x1}, 0x3, [0x2, 0x9, 0x627, 0x3, 0x6, 0x9, 0x0, 0x8, 0x7fffffff, 0x2, 0x0, 0x2, 0x8, 0x4, 0xffff, 0x8001]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f00000003c0)={"4d4100825975c8406a5c2945cd31f4a2", r4, 0x0, {0x7fff, 0x5}, {0xbf, 0x1000}, 0x8000, [0x1, 0x7, 0xffffffffffffffe1, 0xd04, 0xfffffffffffffff9, 0x4, 0x963b, 0x1, 0x401, 0x40, 0x0, 0x8, 0x0, 0x1, 0x6, 0x7]}) 02:37:12 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x10, 0x80000001, 0x2, 0x6, 0x2020, 0x1, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={0xffffffffffffffff, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0], 0x0, 0x8, &(0x7f0000000a40)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000a80), &(0x7f0000000ac0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b00)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ec0)={&(0x7f0000000c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10c, 0x10c, 0x6, [@var={0x5, 0x0, 0x0, 0xe, 0x2}, @volatile={0x5, 0x0, 0x0, 0x9, 0x2}, @const={0x5, 0x0, 0x0, 0xa, 0x2}, @union={0x2, 0x9, 0x0, 0x5, 0x1, 0x6, [{0x7, 0x0, 0x8}, {0x9, 0x1, 0x7}, {0xe, 0x4, 0x5}, {0x1, 0x2, 0x3f}, {0x4, 0x5, 0x9}, {0x8, 0x4, 0x9}, {0x0, 0x0, 0x5}, {0x7, 0x0, 0x8000}, {0xa, 0x5, 0x2}]}, @func={0x6, 0x0, 0x0, 0xc, 0x5}, @union={0x6, 0x7, 0x0, 0x5, 0x1, 0x9, [{0x7, 0x5, 0x400}, {0x3, 0x4, 0x6162771}, {0x4, 0x0, 0x7f}, {0x1, 0x1, 0x8}, {0x9, 0x0, 0x3}, {0x4, 0x5, 0x1}, {0xd, 0x2, 0x80}]}]}, {0x0, [0x0, 0x5f, 0x0, 0x30]}}, &(0x7f0000000dc0)=""/196, 0x12a, 0xc4, 0x0, 0x101}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001040)={0x18, 0x11, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@generic={0x20, 0xb, 0x6, 0x7, 0x1}, @exit], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000007c0)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x17, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000f00)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000f40)={0x4, 0x1, 0xf936, 0x7fffffff}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000f80)=[r1, r0, r0, r1], &(0x7f0000000fc0)=[{0x0, 0x4, 0x10, 0x1}, {0x5, 0x4, 0x9, 0x4}, {0x0, 0x1, 0x9, 0x2}, {0x1, 0x1, 0x0, 0x2}, {0x4, 0x3, 0x5, 0x5}], 0x10, 0x4b3e7aee}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000180)=r0}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000400)={@loopback, 0x0}, &(0x7f0000000440)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@const={0xe, 0x0, 0x0, 0xa, 0x4}, @restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @typedef={0x10, 0x0, 0x0, 0x8, 0x4}, @union={0x1, 0x4, 0x0, 0x5, 0x0, 0x6, [{0xd, 0x4, 0x800}, {0xd, 0x5, 0xfffffffb}, {0x0, 0x3}, {0x0, 0x1, 0xfffffff8}]}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x3e}, @var={0x2, 0x0, 0x0, 0xe, 0x1}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x1e, 0x2}, @restrict={0xa, 0x0, 0x0, 0xb, 0x2}, @fwd={0xa}, @fwd={0x10}]}, {0x0, [0x30, 0x61, 0x2e]}}, &(0x7f0000000580)=""/186, 0xd1, 0xba, 0x0, 0x51880a43}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x19, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_fd={0x18, 0x1, 0x1, 0x0, r1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @map_fd={0x18, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='syzkaller\x00', 0x484, 0x7, &(0x7f00000003c0)=""/7, 0x40f00, 0x0, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x3, 0x3, 0x5, 0x6}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[r1, r0, r1, r1], &(0x7f0000000700)=[{0x0, 0x4, 0xc, 0x9}, {0x0, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xc, 0x6}], 0x10, 0x7}, 0x90) 02:37:13 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x10, 0x80000001, 0x2, 0x6, 0x2020, 0x1, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={0xffffffffffffffff, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0], 0x0, 0x8, &(0x7f0000000a40)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000a80), &(0x7f0000000ac0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b00)}}, 0x10) (async, rerun: 32) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ec0)={&(0x7f0000000c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10c, 0x10c, 0x6, [@var={0x5, 0x0, 0x0, 0xe, 0x2}, @volatile={0x5, 0x0, 0x0, 0x9, 0x2}, @const={0x5, 0x0, 0x0, 0xa, 0x2}, @union={0x2, 0x9, 0x0, 0x5, 0x1, 0x6, [{0x7, 0x0, 0x8}, {0x9, 0x1, 0x7}, {0xe, 0x4, 0x5}, {0x1, 0x2, 0x3f}, {0x4, 0x5, 0x9}, {0x8, 0x4, 0x9}, {0x0, 0x0, 0x5}, {0x7, 0x0, 0x8000}, {0xa, 0x5, 0x2}]}, @func={0x6, 0x0, 0x0, 0xc, 0x5}, @union={0x6, 0x7, 0x0, 0x5, 0x1, 0x9, [{0x7, 0x5, 0x400}, {0x3, 0x4, 0x6162771}, {0x4, 0x0, 0x7f}, {0x1, 0x1, 0x8}, {0x9, 0x0, 0x3}, {0x4, 0x5, 0x1}, {0xd, 0x2, 0x80}]}]}, {0x0, [0x0, 0x5f, 0x0, 0x30]}}, &(0x7f0000000dc0)=""/196, 0x12a, 0xc4, 0x0, 0x101}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001040)={0x18, 0x11, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@generic={0x20, 0xb, 0x6, 0x7, 0x1}, @exit], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000007c0)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x17, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000f00)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000f40)={0x4, 0x1, 0xf936, 0x7fffffff}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000f80)=[r1, r0, r0, r1], &(0x7f0000000fc0)=[{0x0, 0x4, 0x10, 0x1}, {0x5, 0x4, 0x9, 0x4}, {0x0, 0x1, 0x9, 0x2}, {0x1, 0x1, 0x0, 0x2}, {0x4, 0x3, 0x5, 0x5}], 0x10, 0x4b3e7aee}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async, rerun: 32) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2}, 0x48) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000180)=r0}, 0x20) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000400)={@loopback, 0x0}, &(0x7f0000000440)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@const={0xe, 0x0, 0x0, 0xa, 0x4}, @restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @typedef={0x10, 0x0, 0x0, 0x8, 0x4}, @union={0x1, 0x4, 0x0, 0x5, 0x0, 0x6, [{0xd, 0x4, 0x800}, {0xd, 0x5, 0xfffffffb}, {0x0, 0x3}, {0x0, 0x1, 0xfffffff8}]}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x3e}, @var={0x2, 0x0, 0x0, 0xe, 0x1}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x1e, 0x2}, @restrict={0xa, 0x0, 0x0, 0xb, 0x2}, @fwd={0xa}, @fwd={0x10}]}, {0x0, [0x30, 0x61, 0x2e]}}, &(0x7f0000000580)=""/186, 0xd1, 0xba, 0x0, 0x51880a43}, 0x20) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x19, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_fd={0x18, 0x1, 0x1, 0x0, r1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @map_fd={0x18, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='syzkaller\x00', 0x484, 0x7, &(0x7f00000003c0)=""/7, 0x40f00, 0x0, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x3, 0x3, 0x5, 0x6}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[r1, r0, r1, r1], &(0x7f0000000700)=[{0x0, 0x4, 0xc, 0x9}, {0x0, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xc, 0x6}], 0x10, 0x7}, 0x90) 02:37:13 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x9) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@private1}, &(0x7f0000000180)=0x14) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x34000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000100)) (async, rerun: 32) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfff, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) (rerun: 32) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r3}, 0x18) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f00000001c0)={"f9e788ef5f6efeb0a956de3ec29c5dc4", 0x0, 0x0, {0x5, 0x4}, {0x1216, 0x1}, 0x3, [0x2, 0x9, 0x627, 0x3, 0x6, 0x9, 0x0, 0x8, 0x7fffffff, 0x2, 0x0, 0x2, 0x8, 0x4, 0xffff, 0x8001]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f00000003c0)={"4d4100825975c8406a5c2945cd31f4a2", r4, 0x0, {0x7fff, 0x5}, {0xbf, 0x1000}, 0x8000, [0x1, 0x7, 0xffffffffffffffe1, 0xd04, 0xfffffffffffffff9, 0x4, 0x963b, 0x1, 0x401, 0x40, 0x0, 0x8, 0x0, 0x1, 0x6, 0x7]}) 02:37:13 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x10, 0x80000001, 0x2, 0x6, 0x2020, 0x1, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={0xffffffffffffffff, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0], 0x0, 0x8, &(0x7f0000000a40)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000a80), &(0x7f0000000ac0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b00)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ec0)={&(0x7f0000000c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10c, 0x10c, 0x6, [@var={0x5, 0x0, 0x0, 0xe, 0x2}, @volatile={0x5, 0x0, 0x0, 0x9, 0x2}, @const={0x5, 0x0, 0x0, 0xa, 0x2}, @union={0x2, 0x9, 0x0, 0x5, 0x1, 0x6, [{0x7, 0x0, 0x8}, {0x9, 0x1, 0x7}, {0xe, 0x4, 0x5}, {0x1, 0x2, 0x3f}, {0x4, 0x5, 0x9}, {0x8, 0x4, 0x9}, {0x0, 0x0, 0x5}, {0x7, 0x0, 0x8000}, {0xa, 0x5, 0x2}]}, @func={0x6, 0x0, 0x0, 0xc, 0x5}, @union={0x6, 0x7, 0x0, 0x5, 0x1, 0x9, [{0x7, 0x5, 0x400}, {0x3, 0x4, 0x6162771}, {0x4, 0x0, 0x7f}, {0x1, 0x1, 0x8}, {0x9, 0x0, 0x3}, {0x4, 0x5, 0x1}, {0xd, 0x2, 0x80}]}]}, {0x0, [0x0, 0x5f, 0x0, 0x30]}}, &(0x7f0000000dc0)=""/196, 0x12a, 0xc4, 0x0, 0x101}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001040)={0x18, 0x11, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@generic={0x20, 0xb, 0x6, 0x7, 0x1}, @exit], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000007c0)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x17, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000f00)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000f40)={0x4, 0x1, 0xf936, 0x7fffffff}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000f80)=[r1, r0, r0, r1], &(0x7f0000000fc0)=[{0x0, 0x4, 0x10, 0x1}, {0x5, 0x4, 0x9, 0x4}, {0x0, 0x1, 0x9, 0x2}, {0x1, 0x1, 0x0, 0x2}, {0x4, 0x3, 0x5, 0x5}], 0x10, 0x4b3e7aee}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000180)=r0}, 0x20) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000400)={@loopback, 0x0}, &(0x7f0000000440)=0x14) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x5, [@const={0xe, 0x0, 0x0, 0xa, 0x4}, @restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @typedef={0x10, 0x0, 0x0, 0x8, 0x4}, @union={0x1, 0x4, 0x0, 0x5, 0x0, 0x6, [{0xd, 0x4, 0x800}, {0xd, 0x5, 0xfffffffb}, {0x0, 0x3}, {0x0, 0x1, 0xfffffff8}]}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x3e}, @var={0x2, 0x0, 0x0, 0xe, 0x1}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x1e, 0x2}, @restrict={0xa, 0x0, 0x0, 0xb, 0x2}, @fwd={0xa}, @fwd={0x10}]}, {0x0, [0x30, 0x61, 0x2e]}}, &(0x7f0000000580)=""/186, 0xd1, 0xba, 0x0, 0x51880a43}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x19, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_fd={0x18, 0x1, 0x1, 0x0, r1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @map_fd={0x18, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='syzkaller\x00', 0x484, 0x7, &(0x7f00000003c0)=""/7, 0x40f00, 0x0, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x3, 0x3, 0x5, 0x6}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[r1, r0, r1, r1], &(0x7f0000000700)=[{0x0, 0x4, 0xc, 0x9}, {0x0, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xc, 0x6}], 0x10, 0x7}, 0x90) 02:37:13 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x9) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@private1}, &(0x7f0000000180)=0x14) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x34000, 0x0) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x34000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000100)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfff, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfff, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r3}, 0x18) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f00000001c0)={"f9e788ef5f6efeb0a956de3ec29c5dc4", 0x0, 0x0, {0x5, 0x4}, {0x1216, 0x1}, 0x3, [0x2, 0x9, 0x627, 0x3, 0x6, 0x9, 0x0, 0x8, 0x7fffffff, 0x2, 0x0, 0x2, 0x8, 0x4, 0xffff, 0x8001]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f00000003c0)={"4d4100825975c8406a5c2945cd31f4a2", r4, 0x0, {0x7fff, 0x5}, {0xbf, 0x1000}, 0x8000, [0x1, 0x7, 0xffffffffffffffe1, 0xd04, 0xfffffffffffffff9, 0x4, 0x963b, 0x1, 0x401, 0x40, 0x0, 0x8, 0x0, 0x1, 0x6, 0x7]}) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f00000003c0)={"4d4100825975c8406a5c2945cd31f4a2", r4, 0x0, {0x7fff, 0x5}, {0xbf, 0x1000}, 0x8000, [0x1, 0x7, 0xffffffffffffffe1, 0xd04, 0xfffffffffffffff9, 0x4, 0x963b, 0x1, 0x401, 0x40, 0x0, 0x8, 0x0, 0x1, 0x6, 0x7]}) 02:37:13 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x3849, '\x00', 0x0, r0, 0x9, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', r1, 0x4000, r0}, 0x18) 02:37:13 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x3849, '\x00', 0x0, r0, 0x9, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', r1, 0x4000, r0}, 0x18) 02:37:14 executing program 0: memfd_create(&(0x7f0000000040)='\x00', 0x4) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:14 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x3849, '\x00', 0x0, r0, 0x9, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', r1, 0x4000, r0}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', r1, 0x4000, r0}, 0x18) 02:37:14 executing program 0: memfd_create(&(0x7f0000000040)='\x00', 0x4) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:14 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000180)={@private0, 0x0}, &(0x7f00000001c0)=0x14) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$vhost_msg(r3, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/38, 0x26, &(0x7f0000000540)=""/123}}, 0x48) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x1c, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @alu={0x9, 0x1, 0x9, 0x0, 0xf, 0x2, 0x10}, @call={0x85, 0x0, 0x0, 0xc6}, @exit, @call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x36}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000040)='syzkaller\x00', 0xba8e6e2f, 0x43, &(0x7f00000000c0)=""/67, 0x40f00, 0x30, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000200)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x3, 0x800, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r0, r1, r0, 0x1, r1], 0x0, 0x10, 0x8001}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:14 executing program 0: memfd_create(&(0x7f0000000040)='\x00', 0x4) (async, rerun: 64) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (rerun: 64) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:14 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000180)={@private0, 0x0}, &(0x7f00000001c0)=0x14) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$vhost_msg(r3, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/38, 0x26, &(0x7f0000000540)=""/123}}, 0x48) (async) write$vhost_msg(r3, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/38, 0x26, &(0x7f0000000540)=""/123}}, 0x48) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, 0x0) (async) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x1c, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @alu={0x9, 0x1, 0x9, 0x0, 0xf, 0x2, 0x10}, @call={0x85, 0x0, 0x0, 0xc6}, @exit, @call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x36}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000040)='syzkaller\x00', 0xba8e6e2f, 0x43, &(0x7f00000000c0)=""/67, 0x40f00, 0x30, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000200)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x3, 0x800, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r0, r1, r0, 0x1, r1], 0x0, 0x10, 0x8001}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x40c0000) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x20040000) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x48, r1, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4a6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}, @L2TP_ATTR_DEBUG={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x20040044}, 0x4040000) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r1, 0x3a824c843a8aba80, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x38}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'macvtap0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000024}, 0x5) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="000028bd70f7fddbdf25048ba9664400040006009080a1d1122408ef2be927a7f6a80000"], 0x1c}, 0x1, 0x0, 0x0, 0x2000c080}, 0x20040000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) 02:37:15 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000180)={@private0, 0x0}, &(0x7f00000001c0)=0x14) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$vhost_msg(r3, &(0x7f00000005c0)={0x1, {&(0x7f0000000500)=""/38, 0x26, &(0x7f0000000540)=""/123}}, 0x48) (async) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x1c, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @alu={0x9, 0x1, 0x9, 0x0, 0xf, 0x2, 0x10}, @call={0x85, 0x0, 0x0, 0xc6}, @exit, @call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x36}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000040)='syzkaller\x00', 0xba8e6e2f, 0x43, &(0x7f00000000c0)=""/67, 0x40f00, 0x30, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000200)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x3, 0x800, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r0, r1, r0, 0x1, r1], 0x0, 0x10, 0x8001}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x40c0000) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x20040000) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x48, r1, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4a6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}, @L2TP_ATTR_DEBUG={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x20040044}, 0x4040000) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r1, 0x3a824c843a8aba80, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x38}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'macvtap0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000024}, 0x5) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="000028bd70f7fddbdf25048ba9664400040006009080a1d1122408ef2be927a7f6a80000"], 0x1c}, 0x1, 0x0, 0x0, 0x2000c080}, 0x20040000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x40c0000) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x20040000) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x48, r1, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4a6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}, @L2TP_ATTR_DEBUG={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x20040044}, 0x4040000) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r1, 0x3a824c843a8aba80, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x38}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'macvtap0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000024}, 0x5) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="000028bd70f7fddbdf25048ba9664400040006009080a1d1122408ef2be927a7f6a80000"], 0x1c}, 0x1, 0x0, 0x0, 0x2000c080}, 0x20040000) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) (async) 02:37:15 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r2, &(0x7f0000000040)={0x67446698, 0x0, 0x0, 0x3, 0x1, "a38041dc5a218908858e71ec9561"}, 0x1e) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:15 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r2, &(0x7f0000000040)={0x67446698, 0x0, 0x0, 0x3, 0x1, "a38041dc5a218908858e71ec9561"}, 0x1e) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x40c0000) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x20040000) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x48, r1, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4a6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}, @L2TP_ATTR_DEBUG={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x20040044}, 0x4040000) (async, rerun: 64) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r1, 0x3a824c843a8aba80, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x38}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'macvtap0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000024}, 0x5) (rerun: 64) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="000028bd70f7fddbdf25048ba9664400040006009080a1d1122408ef2be927a7f6a80000"], 0x1c}, 0x1, 0x0, 0x0, 0x2000c080}, 0x20040000) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r4}, 0x18) 02:37:16 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r2, &(0x7f0000000040)={0x67446698, 0x0, 0x0, 0x3, 0x1, "a38041dc5a218908858e71ec9561"}, 0x1e) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:16 executing program 0: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@ipv4={""/10, ""/2, @multicast1}, 0x0}, &(0x7f00000000c0)=0x14) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1, r0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@const={0x6, 0x0, 0x0, 0xa, 0x2}, @fwd={0xb}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x54, 0x0, 0x63, 0x1}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x46, 0x0, 0x5d, 0x5}, @var={0x3, 0x0, 0x0, 0xe, 0x5, 0x1}]}}, &(0x7f0000000180)=""/53, 0x62, 0x35, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r3}, 0x18) 02:37:16 executing program 0: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@ipv4={""/10, ""/2, @multicast1}, 0x0}, &(0x7f00000000c0)=0x14) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1, r0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@const={0x6, 0x0, 0x0, 0xa, 0x2}, @fwd={0xb}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x54, 0x0, 0x63, 0x1}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x46, 0x0, 0x5d, 0x5}, @var={0x3, 0x0, 0x0, 0xe, 0x5, 0x1}]}}, &(0x7f0000000180)=""/53, 0x62, 0x35, 0x1}, 0x20) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r3}, 0x18) 02:37:16 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x32f, '\x00', r2, r3, 0x3, 0x3, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r4 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000740)={0x13, 0x10, 0xfa00, {&(0x7f0000000540), 0xffffffffffffffff, 0x1}}, 0x18) r6 = openat$random(0xffffff9c, &(0x7f00000004c0), 0x40000, 0x0) ioctl$RNDADDTOENTCNT(r6, 0x40045201, &(0x7f0000000500)=0xdc8b) 02:37:16 executing program 0: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) (async) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@ipv4={""/10, ""/2, @multicast1}, 0x0}, &(0x7f00000000c0)=0x14) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1, r0}, 0x48) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1, r0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@const={0x6, 0x0, 0x0, 0xa, 0x2}, @fwd={0xb}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x54, 0x0, 0x63, 0x1}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x46, 0x0, 0x5d, 0x5}, @var={0x3, 0x0, 0x0, 0xe, 0x5, 0x1}]}}, &(0x7f0000000180)=""/53, 0x62, 0x35, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r3}, 0x18) 02:37:17 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000600)=[0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000006c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1e, 0x6, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x7}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xe7, &(0x7f00000000c0)=""/231, 0x41100, 0x40, '\x00', r2, 0xcee4411773ef0376, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0xe, 0xc3, 0x10000}, 0x10, r3, 0xffffffffffffffff, 0x3, &(0x7f0000000800)=[r1, r1], &(0x7f0000000980)=[{0x0, 0x3, 0x6, 0xb}, {0x4, 0x4, 0xc}, {0x1, 0x4, 0x1}], 0x10, 0x3ff}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:17 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x32f, '\x00', r2, r3, 0x3, 0x3, 0x1}, 0x48) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r4 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000740)={0x13, 0x10, 0xfa00, {&(0x7f0000000540), 0xffffffffffffffff, 0x1}}, 0x18) r6 = openat$random(0xffffff9c, &(0x7f00000004c0), 0x40000, 0x0) ioctl$RNDADDTOENTCNT(r6, 0x40045201, &(0x7f0000000500)=0xdc8b) 02:37:17 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x32f, '\x00', r2, r3, 0x3, 0x3, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r5}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000740)={0x13, 0x10, 0xfa00, {&(0x7f0000000540), 0xffffffffffffffff, 0x1}}, 0x18) r6 = openat$random(0xffffff9c, &(0x7f00000004c0), 0x40000, 0x0) ioctl$RNDADDTOENTCNT(r6, 0x40045201, &(0x7f0000000500)=0xdc8b) 02:37:17 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000600)=[0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000006c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1e, 0x6, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x7}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xe7, &(0x7f00000000c0)=""/231, 0x41100, 0x40, '\x00', r2, 0xcee4411773ef0376, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0xe, 0xc3, 0x10000}, 0x10, r3, 0xffffffffffffffff, 0x3, &(0x7f0000000800)=[r1, r1], &(0x7f0000000980)=[{0x0, 0x3, 0x6, 0xb}, {0x4, 0x4, 0xc}, {0x1, 0x4, 0x1}], 0x10, 0x3ff}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:18 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000600)=[0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000006c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1e, 0x6, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x7}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xe7, &(0x7f00000000c0)=""/231, 0x41100, 0x40, '\x00', r2, 0xcee4411773ef0376, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0xe, 0xc3, 0x10000}, 0x10, r3, 0xffffffffffffffff, 0x3, &(0x7f0000000800)=[r1, r1], &(0x7f0000000980)=[{0x0, 0x3, 0x6, 0xb}, {0x4, 0x4, 0xc}, {0x1, 0x4, 0x1}], 0x10, 0x3ff}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000600)=[0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000006c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1e, 0x6, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x7}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xe7, &(0x7f00000000c0)=""/231, 0x41100, 0x40, '\x00', r2, 0xcee4411773ef0376, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0xe, 0xc3, 0x10000}, 0x10, r3, 0xffffffffffffffff, 0x3, &(0x7f0000000800)=[r1, r1], &(0x7f0000000980)=[{0x0, 0x3, 0x6, 0xb}, {0x4, 0x4, 0xc}, {0x1, 0x4, 0x1}], 0x10, 0x3ff}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) (async) 02:37:18 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000000)={@local, 0x0}, &(0x7f0000000040)=0x14) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', r0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)={0x3}, 0x8) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1}, 0xc) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r1, 0x105}, 0xc) r3 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f00000000c0)={0x4, 0x8}, 0xffffffffffffff1a) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r4, 0x9}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r2, 0xffffffffffffffff}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r5}, 0x18) 02:37:18 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000000)={@local, 0x0}, &(0x7f0000000040)=0x14) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', r0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)={0x3}, 0x8) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1}, 0xc) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r1, 0x105}, 0xc) r3 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f00000000c0)={0x4, 0x8}, 0xffffffffffffff1a) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r4, 0x9}}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r2, 0xffffffffffffffff}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r5}, 0x18) 02:37:18 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="017fcb94e3f8fc1d400000000000"], 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r4, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'lo\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xa9}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x4060844) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000040)={0x0, 0x2}) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r4, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x64e10586}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:18 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000000)={@local}, &(0x7f0000000040)=0x14) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000000)={@local, 0x0}, &(0x7f0000000040)=0x14) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', r0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)={0x3}, 0x8) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x8) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r1, 0x105}, 0xc) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r1, 0x105}, 0xc) r3 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f00000000c0)={0x4, 0x8}, 0xffffffffffffff1a) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0), 0x0, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r4, 0x9}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r2, 0xffffffffffffffff}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r5}, 0x18) 02:37:18 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r2, 0x0, 0x0) (async, rerun: 64) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="017fcb94e3f8fc1d400000000000"], 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r4, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'lo\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xa9}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x4060844) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000040)={0x0, 0x2}) (async, rerun: 32) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r4, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x64e10586}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) (async, rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) 02:37:19 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000480), 0x367082, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000000c0)={@local, 0x0}, &(0x7f0000000100)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x7, [@var={0x6, 0x0, 0x0, 0xe, 0x3}, @var={0xb, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x61, 0x30, 0x61, 0x0, 0x2e]}}, &(0x7f00000001c0)=""/54, 0x3f, 0x36, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x1c, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9b}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x7, 0x0, 0x8, 0x1, 0x2, 0xffffffffffffffff, 0xfffffffffffffff0}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @generic={0x7f, 0x6, 0x9, 0x2}, @generic={0x3, 0xd, 0x2, 0xf801, 0x2}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xae}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000003c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0xc, 0xf4d5523, 0x3}, 0x10, r5, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x10, 0x8001}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x5}, 0x8) 02:37:19 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="017fcb94e3f8fc1d400000000000"], 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r4, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'lo\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xa9}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x4060844) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000040)={0x0, 0x2}) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r4, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x64e10586}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="017fcb94e3f8fc1d400000000000"], 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r4, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'lo\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xa9}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x4060844) (async) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000040)={0x0, 0x2}) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r4, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x64e10586}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000000)='.\x00', r1}, 0x18) (async) 02:37:19 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) openat$dlm_plock(0xffffff9c, &(0x7f0000000480), 0x367082, 0x0) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000480), 0x367082, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000000c0)={@local, 0x0}, &(0x7f0000000100)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x7, [@var={0x6, 0x0, 0x0, 0xe, 0x3}, @var={0xb, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x61, 0x30, 0x61, 0x0, 0x2e]}}, &(0x7f00000001c0)=""/54, 0x3f, 0x36, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440), 0x8) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x1c, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9b}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x7, 0x0, 0x8, 0x1, 0x2, 0xffffffffffffffff, 0xfffffffffffffff0}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @generic={0x7f, 0x6, 0x9, 0x2}, @generic={0x3, 0xd, 0x2, 0xf801, 0x2}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xae}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000003c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0xc, 0xf4d5523, 0x3}, 0x10, r5, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x10, 0x8001}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x5}, 0x8) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x5}, 0x8) 02:37:19 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000480), 0x367082, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000000c0)={@local, 0x0}, &(0x7f0000000100)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x7, [@var={0x6, 0x0, 0x0, 0xe, 0x3}, @var={0xb, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x61, 0x30, 0x61, 0x0, 0x2e]}}, &(0x7f00000001c0)=""/54, 0x3f, 0x36, 0x1}, 0x20) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x1c, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9b}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x7, 0x0, 0x8, 0x1, 0x2, 0xffffffffffffffff, 0xfffffffffffffff0}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @generic={0x7f, 0x6, 0x9, 0x2}, @generic={0x3, 0xd, 0x2, 0xf801, 0x2}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xae}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000003c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0xc, 0xf4d5523, 0x3}, 0x10, r5, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x10, 0x8001}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x5}, 0x8) 02:37:19 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)='%pS \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000100)='./file0\x00', r2}, 0x18) 02:37:19 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)='%pS \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000100)='./file0\x00', r2}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000040), &(0x7f0000000080)='%pS \x00'}, 0x20) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000100)='./file0\x00', r2}, 0x18) (async) 02:37:19 executing program 1: r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x0, 0x0, @private2}}}, 0xfffffc6c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) r2 = openat$rdma_cm(0xffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000340)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r2}}, 0x18) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r4, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x4, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x99f0, '\x00', 0x0, r4, 0x3, 0x2}, 0x48) openat$cgroup_root(0xffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r5}, 0x18) 02:37:19 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)='%pS \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)=@generic={&(0x7f0000000100)='./file0\x00', r2}, 0x18) 02:37:20 executing program 1: r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x0, 0x0, @private2}}}, 0xfffffc6c) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) r2 = openat$rdma_cm(0xffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000340)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r2}}, 0x18) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r4, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x4, 0x4, 0x4}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x99f0, '\x00', 0x0, r4, 0x3, 0x2}, 0x48) openat$cgroup_root(0xffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r5}, 0x18) 02:37:20 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (fail_nth: 1) 02:37:20 executing program 1: r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x0, 0x0, @private2}}}, 0xfffffc6c) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) r2 = openat$rdma_cm(0xffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000340)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r2}}, 0x18) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r4, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x4, 0x4, 0x4}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x99f0, '\x00', 0x0, r4, 0x3, 0x2}, 0x48) (async) openat$cgroup_root(0xffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r5}, 0x18) [ 9440.511642][T17320] FAULT_INJECTION: forcing a failure. [ 9440.511642][T17320] name failslab, interval 1, probability 0, space 0, times 0 [ 9440.512119][T17320] CPU: 1 PID: 17320 Comm: syz-executor.0 Not tainted 6.8.0-rc1-syzkaller #0 [ 9440.512361][T17320] Hardware name: ARM-Versatile Express [ 9440.512839][T17320] Backtrace: [ 9440.513015][T17320] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9440.513464][T17320] r7:00000cc0 r6:909b0c00 r5:20000013 r4:81fbd1a4 [ 9440.513620][T17320] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9440.514083][T17320] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9440.514358][T17320] r5:00000000 r4:8270f4d4 [ 9440.514525][T17320] [<81852f28>] (dump_stack) from [<808849dc>] (should_fail_ex+0x18c/0x1dc) [ 9440.514901][T17320] [<80884850>] (should_fail_ex) from [<804c1464>] (__should_failslab+0x6c/0x80) [ 9440.515263][T17320] r6:909b0c00 r5:00000cc0 r4:82ca8a80 [ 9440.515753][T17320] [<804c13f8>] (__should_failslab) from [<804a5e30>] (should_failslab+0x10/0x20) [ 9440.524954][T17320] [<804a5e20>] (should_failslab) from [<804a6c04>] (kmem_cache_alloc+0x50/0x358) [ 9440.525522][T17320] [<804a6bb4>] (kmem_cache_alloc) from [<804f7cc4>] (getname_flags.part.0+0x2c/0x170) [ 9440.526065][T17320] r10:0000014a r9:8218f6c8 r8:00004000 r7:00000000 r6:20000000 r5:00000000 [ 9440.526478][T17320] r4:20000000 [ 9440.526624][T17320] [<804f7c98>] (getname_flags.part.0) from [<804fe04c>] (getname_flags+0x44/0x58) [ 9440.526990][T17320] r10:0000014a r9:909b0c00 r8:00001400 r7:20000040 r6:00004000 r5:00000000 [ 9440.527270][T17320] r4:20000000 r3:00000000 [ 9440.527432][T17320] [<804fe008>] (getname_flags) from [<804ff65c>] (sys_linkat+0x34/0x68) [ 9440.527967][T17320] r7:20000040 r6:ffffff9c r5:00000000 r4:00000003 [ 9440.529067][T17320] [<804ff628>] (sys_linkat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9440.530422][T17320] Exception stack(0xed115fa8 to 0xed115ff0) [ 9440.531170][T17320] 5fa0: 00001400 00000000 00000003 20000000 ffffff9c 20000040 [ 9440.531698][T17320] 5fc0: 00001400 00000000 0004f070 0000014a 7ea41326 7ea41327 003d0f00 76b7d0fc [ 9440.532007][T17320] 5fe0: 76b7cf08 76b7cef8 000167e8 00050bd0 [ 9440.532220][T17320] r8:80200288 r7:0000014a r6:0004f070 r5:00000000 r4:00001400 02:37:20 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (fail_nth: 2) [ 9440.726912][T17325] FAULT_INJECTION: forcing a failure. [ 9440.726912][T17325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 9440.727465][T17325] CPU: 1 PID: 17325 Comm: syz-executor.0 Not tainted 6.8.0-rc1-syzkaller #0 [ 9440.727728][T17325] Hardware name: ARM-Versatile Express [ 9440.727891][T17325] Backtrace: [ 9440.728050][T17325] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9440.728348][T17325] r7:82edc010 r6:20000000 r5:20000013 r4:81fbd1a4 [ 9440.728582][T17325] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9440.728836][T17325] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9440.729099][T17325] r5:00000000 r4:8273f9b0 [ 9440.729250][T17325] [<81852f28>] (dump_stack) from [<808849dc>] (should_fail_ex+0x18c/0x1dc) [ 9440.729611][T17325] [<80884850>] (should_fail_ex) from [<80884a40>] (should_fail+0x14/0x18) [ 9440.730006][T17325] r6:20000000 r5:00000000 r4:82edc000 [ 9440.730186][T17325] [<80884a2c>] (should_fail) from [<80884a60>] (should_fail_usercopy+0x1c/0x20) [ 9440.730437][T17325] [<80884a44>] (should_fail_usercopy) from [<8088a524>] (strncpy_from_user+0x1c/0x150) [ 9440.730706][T17325] [<8088a508>] (strncpy_from_user) from [<804f7ce0>] (getname_flags.part.0+0x48/0x170) [ 9440.731094][T17325] r10:0000014a r9:8218f6c8 r8:00004000 r7:00000000 r6:20000000 r5:00000000 [ 9440.731481][T17325] r4:82edc000 r3:909b3c00 [ 9440.731648][T17325] [<804f7c98>] (getname_flags.part.0) from [<804fe04c>] (getname_flags+0x44/0x58) [ 9440.731929][T17325] r10:0000014a r9:909b3c00 r8:00001400 r7:20000040 r6:00004000 r5:00000000 [ 9440.732407][T17325] r4:20000000 r3:00000000 [ 9440.732931][T17325] [<804fe008>] (getname_flags) from [<804ff65c>] (sys_linkat+0x34/0x68) [ 9440.733475][T17325] r7:20000040 r6:ffffff9c r5:00000000 r4:00000003 [ 9440.733849][T17325] [<804ff628>] (sys_linkat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9440.734450][T17325] Exception stack(0xed11dfa8 to 0xed11dff0) [ 9440.735187][T17325] dfa0: 00001400 00000000 00000003 20000000 ffffff9c 20000040 [ 9440.735553][T17325] dfc0: 00001400 00000000 0004f070 0000014a 7ea41326 7ea41327 003d0f00 76b7d0fc [ 9440.735941][T17325] dfe0: 76b7cf08 76b7cef8 000167e8 00050bd0 [ 9440.736377][T17325] r8:80200288 r7:0000014a r6:0004f070 r5:00000000 r4:00001400 02:37:20 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:20 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (fail_nth: 3) 02:37:20 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) [ 9441.018714][T17329] FAULT_INJECTION: forcing a failure. [ 9441.018714][T17329] name failslab, interval 1, probability 0, space 0, times 0 [ 9441.019359][T17329] CPU: 1 PID: 17329 Comm: syz-executor.0 Not tainted 6.8.0-rc1-syzkaller #0 [ 9441.019791][T17329] Hardware name: ARM-Versatile Express [ 9441.020048][T17329] Backtrace: [ 9441.020204][T17329] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9441.020874][T17329] r7:00000cc0 r6:909b0c00 r5:20000013 r4:81fbd1a4 [ 9441.021385][T17329] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9441.021620][T17329] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9441.022759][T17329] r5:00000000 r4:8270f4d4 [ 9441.022949][T17329] [<81852f28>] (dump_stack) from [<808849dc>] (should_fail_ex+0x18c/0x1dc) [ 9441.023689][T17329] [<80884850>] (should_fail_ex) from [<804c1464>] (__should_failslab+0x6c/0x80) [ 9441.024826][T17329] r6:909b0c00 r5:00000cc0 r4:82ca8a80 [ 9441.025011][T17329] [<804c13f8>] (__should_failslab) from [<804a5e30>] (should_failslab+0x10/0x20) [ 9441.025525][T17329] [<804a5e20>] (should_failslab) from [<804a6c04>] (kmem_cache_alloc+0x50/0x358) [ 9441.026820][T17329] [<804a6bb4>] (kmem_cache_alloc) from [<804f7cc4>] (getname_flags.part.0+0x2c/0x170) [ 9441.027413][T17329] r10:0000014a r9:8218f6c8 r8:00000000 r7:00000000 r6:20000040 r5:00000000 [ 9441.028661][T17329] r4:20000040 [ 9441.028921][T17329] [<804f7c98>] (getname_flags.part.0) from [<804fe04c>] (getname_flags+0x44/0x58) [ 9441.030221][T17329] r10:0000014a r9:909b0c00 r8:00001400 r7:20000040 r6:00000000 r5:00000000 [ 9441.030796][T17329] r4:20000040 r3:00000000 [ 9441.031572][T17329] [<804fe008>] (getname_flags) from [<804ff670>] (sys_linkat+0x48/0x68) [ 9441.032671][T17329] r7:20000040 r6:ffffff9c r5:82ede000 r4:00000003 [ 9441.033992][T17329] [<804ff628>] (sys_linkat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9441.034640][T17329] Exception stack(0xed121fa8 to 0xed121ff0) [ 9441.035275][T17329] 1fa0: 00001400 00000000 00000003 20000000 ffffff9c 20000040 [ 9441.036138][T17329] 1fc0: 00001400 00000000 0004f070 0000014a 7ea41326 7ea41327 003d0f00 76b7d0fc [ 9441.037728][T17329] 1fe0: 76b7cf08 76b7cef8 000167e8 00050bd0 [ 9441.038136][T17329] r8:80200288 r7:0000014a r6:0004f070 r5:00000000 r4:00001400 02:37:21 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (fail_nth: 4) 02:37:21 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) [ 9441.409504][T17334] FAULT_INJECTION: forcing a failure. [ 9441.409504][T17334] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 9441.410281][T17334] CPU: 0 PID: 17334 Comm: syz-executor.0 Not tainted 6.8.0-rc1-syzkaller #0 [ 9441.410561][T17334] Hardware name: ARM-Versatile Express [ 9441.410778][T17334] Backtrace: [ 9441.410943][T17334] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9441.411428][T17334] r7:82e97010 r6:20000040 r5:20000013 r4:81fbd1a4 [ 9441.411635][T17334] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9441.412116][T17334] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9441.412471][T17334] r5:00000000 r4:8273f9b0 [ 9441.412622][T17334] [<81852f28>] (dump_stack) from [<808849dc>] (should_fail_ex+0x18c/0x1dc) [ 9441.413000][T17334] [<80884850>] (should_fail_ex) from [<80884a40>] (should_fail+0x14/0x18) [ 9441.413332][T17334] r6:20000040 r5:00000000 r4:82e97000 [ 9441.413576][T17334] [<80884a2c>] (should_fail) from [<80884a60>] (should_fail_usercopy+0x1c/0x20) [ 9441.414011][T17334] [<80884a44>] (should_fail_usercopy) from [<8088a524>] (strncpy_from_user+0x1c/0x150) [ 9441.414462][T17334] [<8088a508>] (strncpy_from_user) from [<804f7ce0>] (getname_flags.part.0+0x48/0x170) [ 9441.414865][T17334] r10:0000014a r9:8218f6c8 r8:00000000 r7:00000000 r6:20000040 r5:00000000 [ 9441.415185][T17334] r4:82e97000 r3:909b3c00 [ 9441.415331][T17334] [<804f7c98>] (getname_flags.part.0) from [<804fe04c>] (getname_flags+0x44/0x58) [ 9441.415627][T17334] r10:0000014a r9:909b3c00 r8:00001400 r7:20000040 r6:00000000 r5:00000000 [ 9441.415859][T17334] r4:20000040 r3:00000000 [ 9441.416122][T17334] [<804fe008>] (getname_flags) from [<804ff670>] (sys_linkat+0x48/0x68) [ 9441.416383][T17334] r7:20000040 r6:ffffff9c r5:82e96000 r4:00000003 [ 9441.416571][T17334] [<804ff628>] (sys_linkat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9441.417228][T17334] Exception stack(0xed121fa8 to 0xed121ff0) [ 9441.417558][T17334] 1fa0: 00001400 00000000 00000003 20000000 ffffff9c 20000040 [ 9441.418027][T17334] 1fc0: 00001400 00000000 0004f070 0000014a 7ea41326 7ea41327 003d0f00 76b7d0fc [ 9441.418688][T17334] 1fe0: 76b7cf08 76b7cef8 000167e8 00050bd0 [ 9441.418980][T17334] r8:80200288 r7:0000014a r6:0004f070 r5:00000000 r4:00001400 02:37:21 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (fail_nth: 5) 02:37:21 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x200, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) [ 9441.674774][T17340] FAULT_INJECTION: forcing a failure. [ 9441.674774][T17340] name failslab, interval 1, probability 0, space 0, times 0 [ 9441.698525][T17340] CPU: 1 PID: 17340 Comm: syz-executor.0 Not tainted 6.8.0-rc1-syzkaller #0 [ 9441.701951][T17340] Hardware name: ARM-Versatile Express [ 9441.702359][T17340] Backtrace: [ 9441.703649][T17340] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9441.705374][T17340] r7:00000cc0 r6:8510b000 r5:20000013 r4:81fbd1a4 [ 9441.705929][T17340] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9441.706316][T17340] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9441.707673][T17340] r5:00000000 r4:8270f4d4 [ 9441.707969][T17340] [<81852f28>] (dump_stack) from [<808849dc>] (should_fail_ex+0x18c/0x1dc) [ 9441.709449][T17340] [<80884850>] (should_fail_ex) from [<804c1464>] (__should_failslab+0x6c/0x80) [ 9441.710029][T17340] r6:8510b000 r5:00000cc0 r4:82ca8b40 [ 9441.711521][T17340] [<804c13f8>] (__should_failslab) from [<804a5e30>] (should_failslab+0x10/0x20) [ 9441.712212][T17340] [<804a5e20>] (should_failslab) from [<804a6f60>] (kmem_cache_alloc_lru+0x54/0x4a0) [ 9441.715020][T17340] [<804a6f0c>] (kmem_cache_alloc_lru) from [<805061a8>] (__d_alloc+0x30/0x228) [ 9441.715521][T17340] r10:00000000 r9:00000600 r8:8218f6bc r7:84099000 r6:862605a0 r5:ed129ed8 [ 9441.715974][T17340] r4:862605a0 [ 9441.716315][T17340] [<80506178>] (__d_alloc) from [<805063b8>] (d_alloc+0x18/0x68) [ 9441.717742][T17340] r9:00000600 r8:8489a390 r7:ed129ed8 r6:862605a0 r5:00000600 r4:862605a0 [ 9441.725025][T17340] [<805063a0>] (d_alloc) from [<804f7b74>] (lookup_one_qstr_excl+0x48/0x90) [ 9441.725457][T17340] r7:ed129ed8 r6:862605a0 r5:00000600 r4:00000000 [ 9441.725801][T17340] [<804f7b2c>] (lookup_one_qstr_excl) from [<804fc9e4>] (filename_create+0xd0/0x198) [ 9441.726833][T17340] r9:00000600 r8:00000000 r7:00000600 r6:ed129ed8 r5:ed129f3c r4:00000000 [ 9441.727458][T17340] [<804fc914>] (filename_create) from [<804ff3d4>] (do_linkat+0x98/0x2ec) [ 9441.728968][T17340] r9:8510b000 r8:00001400 r7:82edf000 r6:82edc000 r5:00000001 r4:00000000 [ 9441.729397][T17340] [<804ff33c>] (do_linkat) from [<804ff688>] (sys_linkat+0x60/0x68) [ 9441.730949][T17340] r10:0000014a r9:8510b000 r8:00001400 r7:20000040 r6:ffffff9c r5:82edc000 [ 9441.732206][T17340] r4:00000003 [ 9441.732407][T17340] [<804ff628>] (sys_linkat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9441.734263][T17340] Exception stack(0xed129fa8 to 0xed129ff0) [ 9441.734696][T17340] 9fa0: 00001400 00000000 00000003 20000000 ffffff9c 20000040 [ 9441.735197][T17340] 9fc0: 00001400 00000000 0004f070 0000014a 7ea41326 7ea41327 003d0f00 76b7d0fc [ 9441.735525][T17340] 9fe0: 76b7cf08 76b7cef8 000167e8 00050bd0 [ 9441.736144][T17340] r8:80200288 r7:0000014a r6:0004f070 r5:00000000 r4:00001400 02:37:21 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x200, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:21 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (fail_nth: 6) [ 9441.951740][T17344] FAULT_INJECTION: forcing a failure. [ 9441.951740][T17344] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 9441.952273][T17344] CPU: 0 PID: 17344 Comm: syz-executor.0 Not tainted 6.8.0-rc1-syzkaller #0 [ 9441.952923][T17344] Hardware name: ARM-Versatile Express [ 9441.953845][T17344] Backtrace: [ 9441.955077][T17344] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9441.955465][T17344] r7:00000000 r6:00000000 r5:20000013 r4:81fbd1a4 [ 9441.957592][T17344] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9441.957911][T17344] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9441.958347][T17344] r5:00000000 r4:8273f9b0 [ 9441.959793][T17344] [<81852f28>] (dump_stack) from [<808849dc>] (should_fail_ex+0x18c/0x1dc) [ 9441.960126][T17344] [<80884850>] (should_fail_ex) from [<80884a40>] (should_fail+0x14/0x18) [ 9441.960811][T17344] r6:00000000 r5:ed129f68 r4:00000002 [ 9441.961050][T17344] [<80884a2c>] (should_fail) from [<80884a60>] (should_fail_usercopy+0x1c/0x20) [ 9441.961582][T17344] [<80884a44>] (should_fail_usercopy) from [<8051f144>] (simple_read_from_buffer+0x8c/0x118) [ 9441.961891][T17344] [<8051f0b8>] (simple_read_from_buffer) from [<80590a7c>] (proc_fail_nth_read+0xb8/0x100) [ 9441.962462][T17344] r9:805909c4 r8:00000002 r7:ed129f68 r6:0000000f r5:76b7cf78 r4:8510b000 [ 9441.962939][T17344] [<805909c4>] (proc_fail_nth_read) from [<804e8ee0>] (vfs_read+0x98/0x314) [ 9441.963590][T17344] r8:76b7cf78 r7:ed129f68 r6:8510b000 r5:0000000f r4:8db26600 [ 9441.963800][T17344] [<804e8e48>] (vfs_read) from [<804e9b58>] (ksys_read+0x78/0xf8) [ 9441.964083][T17344] r10:00000003 r9:8510b000 r8:80200288 r7:00000000 r6:00000000 r5:8db26600 [ 9441.964336][T17344] r4:8db26603 [ 9441.964805][T17344] [<804e9ae0>] (ksys_read) from [<804e9be8>] (sys_read+0x10/0x14) [ 9441.965514][T17344] r7:00000003 r6:00000004 r5:76b7cf78 r4:0000000f [ 9441.965741][T17344] [<804e9bd8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9441.966408][T17344] Exception stack(0xed129fa8 to 0xed129ff0) [ 9441.966897][T17344] 9fa0: 0000000f 76b7cf78 00000004 76b7cf78 0000000f 00000000 [ 9441.967199][T17344] 9fc0: 0000000f 76b7cf78 00000004 00000003 7ea41326 7ea41327 003d0f00 76b7d0fc [ 9441.967763][T17344] 9fe0: 0000005c 76b7cf18 00091164 0004ef94 02:37:22 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x14400, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:22 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x200, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:22 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x14400, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:22 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r1, 0xffffffffffffffff}, 0x4) r3 = openat$cgroup_root(0xffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r3, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:22 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x14400, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:22 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r1, 0xffffffffffffffff}, 0x4) r3 = openat$cgroup_root(0xffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r3, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:22 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r1, 0xffffffffffffffff}, 0x4) (async) r3 = openat$cgroup_root(0xffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r3, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:22 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x9}, [@jmp={0x5, 0x0, 0x0, 0x6, 0x5, 0xfffffffffffffff8, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x8, 0x1000, &(0x7f0000000140)=""/4096, 0x40f00, 0x24, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001140)={0x2, 0x10, 0x100, 0xffffff7f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001180)=[r0, r0, r0, r0, r0], &(0x7f00000011c0)=[{0x3, 0x5, 0x2, 0xa}], 0x10, 0x21}, 0x90) 02:37:23 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x9}, [@jmp={0x5, 0x0, 0x0, 0x6, 0x5, 0xfffffffffffffff8, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x8, 0x1000, &(0x7f0000000140)=""/4096, 0x40f00, 0x24, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001140)={0x2, 0x10, 0x100, 0xffffff7f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001180)=[r0, r0, r0, r0, r0], &(0x7f00000011c0)=[{0x3, 0x5, 0x2, 0xa}], 0x10, 0x21}, 0x90) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x9}, [@jmp={0x5, 0x0, 0x0, 0x6, 0x5, 0xfffffffffffffff8, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x8, 0x1000, &(0x7f0000000140)=""/4096, 0x40f00, 0x24, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001140)={0x2, 0x10, 0x100, 0xffffff7f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001180)=[r0, r0, r0, r0, r0], &(0x7f00000011c0)=[{0x3, 0x5, 0x2, 0xa}], 0x10, 0x21}, 0x90) (async) 02:37:23 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x1f, '\x00', r2, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:23 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x1f, '\x00', r2, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:23 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x9}, [@jmp={0x5, 0x0, 0x0, 0x6, 0x5, 0xfffffffffffffff8, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x8, 0x1000, &(0x7f0000000140)=""/4096, 0x40f00, 0x24, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001140)={0x2, 0x10, 0x100, 0xffffff7f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001180)=[r0, r0, r0, r0, r0], &(0x7f00000011c0)=[{0x3, 0x5, 0x2, 0xa}], 0x10, 0x21}, 0x90) 02:37:23 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x1f, '\x00', r2, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:24 executing program 0: r0 = shmget(0x1, 0x3000, 0x10, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000340)=""/95) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000540)=@v1={0x0, @adiantum, 0x10, @desc2}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000180)={r2, 0x2}) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r3 = openat$dir(0xffffff9c, &(0x7f0000000080)='./file0\x00', 0x40000, 0x0) openat$tcp_congestion(0xffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000001c0)=0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r1) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x5c, r5, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'tunl0\x00'}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x80}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x800) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000200)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000240)={"b755bdd861914641ece3f5508c62c50f", r4, r6, {0x8000000000000001, 0x8}, {0x6, 0x6}, 0x81, [0xffffffff7fffffff, 0xddf, 0x4, 0x1, 0x1, 0x5, 0x1, 0x3ff, 0x200, 0xffffffffffffa2bc, 0x7fffffffffffffff, 0x8000000000000000, 0x7, 0x14a, 0x0, 0x8001]}) 02:37:24 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x7, 0x40800000}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%pK \x00'}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x7, 0x5, 0x1, 0x50, r1, 0x1ff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x4, 0x2, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:37:24 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x7, 0x40800000}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%pK \x00'}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x7, 0x5, 0x1, 0x50, r1, 0x1ff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x4, 0x2, 0x2}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x7, 0x5, 0x1, 0x50, r1, 0x1ff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x4, 0x2, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:37:24 executing program 0: r0 = shmget(0x1, 0x3000, 0x10, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000340)=""/95) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000540)=@v1={0x0, @adiantum, 0x10, @desc2}) (async) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000180)={r2, 0x2}) (async) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r3 = openat$dir(0xffffff9c, &(0x7f0000000080)='./file0\x00', 0x40000, 0x0) openat$tcp_congestion(0xffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000001c0)=0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r1) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x5c, r5, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'tunl0\x00'}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x80}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x800) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000200)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000240)={"b755bdd861914641ece3f5508c62c50f", r4, r6, {0x8000000000000001, 0x8}, {0x6, 0x6}, 0x81, [0xffffffff7fffffff, 0xddf, 0x4, 0x1, 0x1, 0x5, 0x1, 0x3ff, 0x200, 0xffffffffffffa2bc, 0x7fffffffffffffff, 0x8000000000000000, 0x7, 0x14a, 0x0, 0x8001]}) 02:37:24 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x7, 0x40800000}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%pK \x00'}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x7, 0x5, 0x1, 0x50, r1, 0x1ff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x4, 0x2, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x7, 0x40800000}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0}, &(0x7f00000000c0), &(0x7f0000000100)='%pK \x00'}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x7, 0x5, 0x1, 0x50, r1, 0x1ff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x4, 0x2, 0x2}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) (async) 02:37:25 executing program 0: r0 = shmget(0x1, 0x3000, 0x10, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000340)=""/95) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000540)=@v1={0x0, @adiantum, 0x10, @desc2}) (async) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000180)={r2, 0x2}) (async) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) r3 = openat$dir(0xffffff9c, &(0x7f0000000080)='./file0\x00', 0x40000, 0x0) openat$tcp_congestion(0xffffff9c, &(0x7f0000000100), 0x1, 0x0) (async) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000001c0)=0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r1) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x5c, r5, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'tunl0\x00'}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x80}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x800) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000200)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000240)={"b755bdd861914641ece3f5508c62c50f", r4, r6, {0x8000000000000001, 0x8}, {0x6, 0x6}, 0x81, [0xffffffff7fffffff, 0xddf, 0x4, 0x1, 0x1, 0x5, 0x1, 0x3ff, 0x200, 0xffffffffffffa2bc, 0x7fffffffffffffff, 0x8000000000000000, 0x7, 0x14a, 0x0, 0x8001]}) 02:37:25 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0xfffffffffffffdca) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000005c0)=@v1={0x0, @aes256, 0x8, @desc2}) r2 = openat$dir(0xffffff9c, &(0x7f0000000600)='./file0/file0\x00', 0x40800, 0x1e) faccessat2(r2, &(0x7f0000000640)='./file0/file0\x00', 0x4, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x26, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x800}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x8}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0xfffffff9, 0x47, &(0x7f00000000c0)=""/71, 0x41000, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000480)=[r0, r3, r0, r0, r0], &(0x7f00000004c0)=[{0x5, 0x3, 0xa, 0x2}, {0x4, 0x89, 0x1, 0x1}, {0x5, 0x4, 0x0, 0x6}], 0x10, 0x1}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) 02:37:25 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) faccessat2(r0, &(0x7f00000000c0)='./file0\x00', 0x49, 0x1800) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000280)={@desc={0x1, 0x0, @desc4}}) linkat(r0, &(0x7f0000000000)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000001c0)={0x7, 0x0, 'client0\x00', 0x0, "cbbd57fe6b08b5d0", "14d059166a5bfd28a016b09e5b47644e9d7871986e4ec02495b9d4cacf6e6a7c", 0x8000, 0x4}) 02:37:25 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0xfffffffffffffdca) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000005c0)=@v1={0x0, @aes256, 0x8, @desc2}) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000005c0)=@v1={0x0, @aes256, 0x8, @desc2}) r2 = openat$dir(0xffffff9c, &(0x7f0000000600)='./file0/file0\x00', 0x40800, 0x1e) faccessat2(r2, &(0x7f0000000640)='./file0/file0\x00', 0x4, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x3}, 0x48) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x26, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x800}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x8}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0xfffffff9, 0x47, &(0x7f00000000c0)=""/71, 0x41000, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000480)=[r0, r3, r0, r0, r0], &(0x7f00000004c0)=[{0x5, 0x3, 0xa, 0x2}, {0x4, 0x89, 0x1, 0x1}, {0x5, 0x4, 0x0, 0x6}], 0x10, 0x1}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) 02:37:26 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) faccessat2(r0, &(0x7f00000000c0)='./file0\x00', 0x49, 0x1800) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000280)={@desc={0x1, 0x0, @desc4}}) (async) linkat(r0, &(0x7f0000000000)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) (async) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000001c0)={0x7, 0x0, 'client0\x00', 0x0, "cbbd57fe6b08b5d0", "14d059166a5bfd28a016b09e5b47644e9d7871986e4ec02495b9d4cacf6e6a7c", 0x8000, 0x4}) 02:37:26 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0xfffffffffffffdca) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000005c0)=@v1={0x0, @aes256, 0x8, @desc2}) (async) r2 = openat$dir(0xffffff9c, &(0x7f0000000600)='./file0/file0\x00', 0x40800, 0x1e) faccessat2(r2, &(0x7f0000000640)='./file0/file0\x00', 0x4, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x26, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x800}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x8}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0xfffffff9, 0x47, &(0x7f00000000c0)=""/71, 0x41000, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000480)=[r0, r3, r0, r0, r0], &(0x7f00000004c0)=[{0x5, 0x3, 0xa, 0x2}, {0x4, 0x89, 0x1, 0x1}, {0x5, 0x4, 0x0, 0x6}], 0x10, 0x1}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) 02:37:26 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) faccessat2(r0, &(0x7f00000000c0)='./file0\x00', 0x49, 0x1800) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000280)={@desc={0x1, 0x0, @desc4}}) linkat(r0, &(0x7f0000000000)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000001c0)={0x7, 0x0, 'client0\x00', 0x0, "cbbd57fe6b08b5d0", "14d059166a5bfd28a016b09e5b47644e9d7871986e4ec02495b9d4cacf6e6a7c", 0x8000, 0x4}) openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) faccessat2(r0, &(0x7f00000000c0)='./file0\x00', 0x49, 0x1800) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000280)={@desc={0x1, 0x0, @desc4}}) (async) linkat(r0, &(0x7f0000000000)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) (async) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000001c0)={0x7, 0x0, 'client0\x00', 0x0, "cbbd57fe6b08b5d0", "14d059166a5bfd28a016b09e5b47644e9d7871986e4ec02495b9d4cacf6e6a7c", 0x8000, 0x4}) (async) 02:37:26 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)='%pB \x00'}, 0x20) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x4}, 0xfffffffffffffe89) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7f, 0xff, 0xff, 0x1, r0, 0x7fffffff, '\x00', 0x0, r1, 0x5, 0x3, 0x5, 0xb}, 0x48) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0xfff, '\x00', 0x0, r1, 0x3, 0x4, 0x4}, 0x48) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@initdev, 0x0}, &(0x7f0000000700)=0x14) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r0, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000800)='%pi6 \x00'}, 0x20) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) readlinkat(r6, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=""/233, 0xe9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r2, 0xffffffffffffffff}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000600)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1f}], &(0x7f0000000680)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x50, '\x00', r4, 0x0, r1, 0x8, &(0x7f0000000740)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0x1, 0xd, 0x11, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000980)=[r5, r2, r6, r7, r1, r0], &(0x7f00000009c0)=[{0x0, 0x1, 0xd, 0x9}], 0x10, 0x5}, 0x90) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r8, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@ifindex, 0x922d7ae2ef9c6d5e, 0x0, 0x80, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r8}, &(0x7f0000000200), &(0x7f0000000340)='%pS \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r9}, 0x18) r10 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r10, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0xffff, @loopback, 0x20}}}, 0x30) 02:37:26 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:27 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:37:27 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)='%pB \x00'}, 0x20) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x4}, 0xfffffffffffffe89) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7f, 0xff, 0xff, 0x1, r0, 0x7fffffff, '\x00', 0x0, r1, 0x5, 0x3, 0x5, 0xb}, 0x48) (async) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0xfff, '\x00', 0x0, r1, 0x3, 0x4, 0x4}, 0x48) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@initdev, 0x0}, &(0x7f0000000700)=0x14) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r0, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000800)='%pi6 \x00'}, 0x20) (async) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) readlinkat(r6, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=""/233, 0xe9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r2, 0xffffffffffffffff}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000600)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1f}], &(0x7f0000000680)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x50, '\x00', r4, 0x0, r1, 0x8, &(0x7f0000000740)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0x1, 0xd, 0x11, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000980)=[r5, r2, r6, r7, r1, r0], &(0x7f00000009c0)=[{0x0, 0x1, 0xd, 0x9}], 0x10, 0x5}, 0x90) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r8, 0xffffffffffffffff}, 0x4) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@ifindex, 0x922d7ae2ef9c6d5e, 0x0, 0x80, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r8}, &(0x7f0000000200), &(0x7f0000000340)='%pS \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r9}, 0x18) r10 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r10, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0xffff, @loopback, 0x20}}}, 0x30) 02:37:27 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:27 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file1\x00', r0, &(0x7f0000000040)='./file1\x00', 0x1000) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 02:37:27 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)='%pB \x00'}, 0x20) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x4}, 0xfffffffffffffe89) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7f, 0xff, 0xff, 0x1, r0, 0x7fffffff, '\x00', 0x0, r1, 0x5, 0x3, 0x5, 0xb}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7f, 0xff, 0xff, 0x1, r0, 0x7fffffff, '\x00', 0x0, r1, 0x5, 0x3, 0x5, 0xb}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0xfff, '\x00', 0x0, r1, 0x3, 0x4, 0x4}, 0x48) (async) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0xfff, '\x00', 0x0, r1, 0x3, 0x4, 0x4}, 0x48) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@initdev, 0x0}, &(0x7f0000000700)=0x14) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r0, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000800)='%pi6 \x00'}, 0x20) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) readlinkat(r6, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=""/233, 0xe9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r2, 0xffffffffffffffff}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000600)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1f}], &(0x7f0000000680)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x50, '\x00', r4, 0x0, r1, 0x8, &(0x7f0000000740)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0x1, 0xd, 0x11, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000980)=[r5, r2, r6, r7, r1, r0], &(0x7f00000009c0)=[{0x0, 0x1, 0xd, 0x9}], 0x10, 0x5}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000600)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1f}], &(0x7f0000000680)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x50, '\x00', r4, 0x0, r1, 0x8, &(0x7f0000000740)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0x1, 0xd, 0x11, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000980)=[r5, r2, r6, r7, r1, r0], &(0x7f00000009c0)=[{0x0, 0x1, 0xd, 0x9}], 0x10, 0x5}, 0x90) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r8}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r8, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@ifindex, 0x922d7ae2ef9c6d5e, 0x0, 0x80, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@ifindex, 0x922d7ae2ef9c6d5e, 0x0, 0x80, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r8}, &(0x7f0000000200), &(0x7f0000000340)='%pS \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r9}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r9}, 0x18) r10 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r10, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0xffff, @loopback, 0x20}}}, 0x30) 02:37:27 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file1\x00', r0, &(0x7f0000000040)='./file1\x00', 0x1000) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000080)='./file1\x00', r0, &(0x7f0000000040)='./file1\x00', 0x1000) (async) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) (async) 02:37:28 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000003c0)={@remote, 0x0}, &(0x7f0000000400)=0x14) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@ifindex=r2, 0x26, 0x1, 0x1, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@empty, 0x0}, &(0x7f0000000040)=0x14) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000180), 0xc4040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x3, r5, 0x10, 0x0, @in={0x2, 0x4e23, @rand_addr=0x64010102}}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x7, 0x9, 0x100, 0x1, 0x7fff, '\x00', r3, 0xffffffffffffffff, 0x2, 0x1, 0x4, 0xb}, 0x48) 02:37:28 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file1\x00', r0, &(0x7f0000000040)='./file1\x00', 0x1000) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 02:37:28 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000003c0)={@remote, 0x0}, &(0x7f0000000400)=0x14) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@ifindex=r2, 0x26, 0x1, 0x1, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@empty, 0x0}, &(0x7f0000000040)=0x14) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000180), 0xc4040, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x3, r5, 0x10, 0x0, @in={0x2, 0x4e23, @rand_addr=0x64010102}}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x7, 0x9, 0x100, 0x1, 0x7fff, '\x00', r3, 0xffffffffffffffff, 0x2, 0x1, 0x4, 0xb}, 0x48) 02:37:28 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x340, 0x0) r1 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r2, 0x3}}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000100)={@desc={0x1, 0x0, @desc4}}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0x50, @time={0xffffff34, 0x9}, 0x0, {0x0, 0x1}, 0x7, 0x0, 0x80}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) r5 = openat$rdma_cm(0xffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f00000003c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000340)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r4, r5}}, 0x18) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x24, r3, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0xc010}, 0x20040000) 02:37:28 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000003c0)={@remote, 0x0}, &(0x7f0000000400)=0x14) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@ifindex=r2, 0x26, 0x1, 0x1, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@empty, 0x0}, &(0x7f0000000040)=0x14) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000180), 0xc4040, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x3, r5, 0x10, 0x0, @in={0x2, 0x4e23, @rand_addr=0x64010102}}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x7, 0x9, 0x100, 0x1, 0x7fff, '\x00', r3, 0xffffffffffffffff, 0x2, 0x1, 0x4, 0xb}, 0x48) 02:37:29 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x340, 0x0) (async) r1 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r2, 0x3}}, 0x10) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000100)={@desc={0x1, 0x0, @desc4}}) (async) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0x50, @time={0xffffff34, 0x9}, 0x0, {0x0, 0x1}, 0x7, 0x0, 0x80}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) r5 = openat$rdma_cm(0xffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f00000003c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000340)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r4, r5}}, 0x18) (async) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x24, r3, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0xc010}, 0x20040000) 02:37:29 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x340, 0x0) (async) r1 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r2, 0x3}}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000100)={@desc={0x1, 0x0, @desc4}}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0x50, @time={0xffffff34, 0x9}, 0x0, {0x0, 0x1}, 0x7, 0x0, 0x80}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) r5 = openat$rdma_cm(0xffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f00000003c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000340)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r4, r5}}, 0x18) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x24, r3, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0xc010}, 0x20040000) 02:37:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xfffffffe, 0x7, 0x3, 0x4f0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0xb}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="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"], 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='i\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000125bd7000fbdbdf2502000000050004000000000006000e0008000000060002000000000006001c00010000000800090004000000050012000900000008000b000100000014002000fc0200000000000000000000000000000600010007000000"], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0, 0xffffffffffffffff}, 0x62) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r0}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) 02:37:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xfffffffe, 0x7, 0x3, 0x4f0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0xb}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xfffffffe, 0x7, 0x3, 0x4f0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0xb}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="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"], 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="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"], 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='i\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000125bd7000fbdbdf2502000000050004000000000006000e0008000000060002000000000006001c00010000000800090004000000050012000900000008000b000100000014002000fc0200000000000000000000000000000600010007000000"], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='i\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000125bd7000fbdbdf2502000000050004000000000006000e0008000000060002000000000006001c00010000000800090004000000050012000900000008000b000100000014002000fc0200000000000000000000000000000600010007000000"], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0, 0xffffffffffffffff}, 0x62) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r0}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) 02:37:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xfffffffe, 0x7, 0x3, 0x4f0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0xb}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="01030200000000000000000000000150b50372ff1b715de2543965063c637c7529b659bed0c02b72d54f53812d1e323f60ca8ef00d24ed695e57bf161e8ead7f611eed0cb4990d158cd9d4369ca1a4fa1410b181a016f3fc8b719c8d828e49f80bcf306f83c3adecc0da53f53a1db489aed9aaea1b00891a404544539f99f7316aa26b153e68cc7aaef9326e0f9c436e2c3d9f70c5282162c2c354c0c9614b563ab99376116b6c48eda18b8d40beb1770d2e20cbfa27bf9cac7288409925a9ed92e6b257a414d1ba04e43e45a171fd86bee95dd69da3978ce7b9b8c67d1d44eb646d6b906d79f9d429b8d74357c5f09c8807095fa556ca61d39646067c5a773da9534d7205b63ecccd2c4fe3b7fe1ca3844550345beb64b32525fc2f07af5bbfa403dda059b9c8625a77f8a687d58af73021b06fbc955431a7af3567"], 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='i\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000125bd7000fbdbdf2502000000050004000000000006000e0008000000060002000000000006001c00010000000800090004000000050012000900000008000b000100000014002000fc0200000000000000000000000000000600010007000000"], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x62) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0, 0xffffffffffffffff}, 0x62) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r0}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) 02:37:30 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x1d7183, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = syz_open_dev$dri(&(0x7f00000000c0), 0x2, 0x80) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4008641c, &(0x7f0000000200)={r2, &(0x7f0000000140)=""/185}) 02:37:30 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x1d7183, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = syz_open_dev$dri(&(0x7f00000000c0), 0x2, 0x80) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4008641c, &(0x7f0000000200)={r2, &(0x7f0000000140)=""/185}) openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x1d7183, 0x0) (async) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) syz_open_dev$dri(&(0x7f00000000c0), 0x2, 0x80) (async) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000100)) (async) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4008641c, &(0x7f0000000200)={r2, &(0x7f0000000140)=""/185}) (async) 02:37:30 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = shmget(0x2, 0x4000, 0x600, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r1, 0x0) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/76) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffa000/0x4000)=nil) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:30 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = shmget(0x2, 0x4000, 0x600, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r1, 0x0) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/76) (async) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffa000/0x4000)=nil) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:30 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x1d7183, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = syz_open_dev$dri(&(0x7f00000000c0), 0x2, 0x80) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4008641c, &(0x7f0000000200)={r2, &(0x7f0000000140)=""/185}) openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x1d7183, 0x0) (async) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) syz_open_dev$dri(&(0x7f00000000c0), 0x2, 0x80) (async) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000100)) (async) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4008641c, &(0x7f0000000200)={r2, &(0x7f0000000140)=""/185}) (async) 02:37:30 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r1 = shmget(0x2, 0x4000, 0x600, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r1, 0x0) (async) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/76) (async) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffa000/0x4000)=nil) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:30 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$cgroup_root(0xffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x4, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x17, 0x100, 0x7, 0x2, 0x406af09f27303f49, r2, 0xfffffff8, '\x00', r3, r4, 0x1, 0x0, 0x4}, 0x48) openat$cgroup_devices(r1, &(0x7f0000000180)='devices.allow\x00', 0x2, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x1400) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000100)={r5, 0x2}) 02:37:31 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_IRQP_READ(r2, 0x8004700b, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:31 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$cgroup_root(0xffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x4, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0x48) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async, rerun: 64) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x17, 0x100, 0x7, 0x2, 0x406af09f27303f49, r2, 0xfffffff8, '\x00', r3, r4, 0x1, 0x0, 0x4}, 0x48) openat$cgroup_devices(r1, &(0x7f0000000180)='devices.allow\x00', 0x2, 0x0) (async, rerun: 64) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x1400) (rerun: 64) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000100)={r5, 0x2}) 02:37:31 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_IRQP_READ(r2, 0x8004700b, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:31 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$cgroup_root(0xffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x4, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x17, 0x100, 0x7, 0x2, 0x406af09f27303f49, r2, 0xfffffff8, '\x00', r3, r4, 0x1, 0x0, 0x4}, 0x48) openat$cgroup_devices(r1, &(0x7f0000000180)='devices.allow\x00', 0x2, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x1400) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000100)={r5, 0x2}) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) openat$cgroup_root(0xffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x4, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x17, 0x100, 0x7, 0x2, 0x406af09f27303f49, r2, 0xfffffff8, '\x00', r3, r4, 0x1, 0x0, 0x4}, 0x48) (async) openat$cgroup_devices(r1, &(0x7f0000000180)='devices.allow\x00', 0x2, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x1400) (async) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)) (async) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000100)={r5, 0x2}) (async) 02:37:31 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_IRQP_READ(r2, 0x8004700b, 0x0) (async) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:32 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DMA_BUF_SET_NAME_A(r0, 0x40046201, &(0x7f0000000580)='\'%\'\x00') ioctl$IOMMU_DESTROY$device(r0, 0x3b80, 0x0) r1 = openat$sndseq(0xffffff9c, &(0x7f0000000440), 0x410000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f00000003c0)={0xc, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000500)={{0x20, 0x1}, {0x5, 0x8}, 0x6, 0x6, 0x1}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r0, 0x3ba0, &(0x7f0000000400)={0x38, 0x2, r2}) getpeername$l2tp6(r0, &(0x7f0000000480), &(0x7f00000004c0)=0x20) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r3, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:32 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x7fff, '\x00', 0x0, r1, 0x4, 0x1, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xb76c, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x2, 0x0, r0, 0x8546, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2}, 0x48) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r5, &(0x7f0000000000)="a1", 0x0}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000500)={@dev, 0x0}, &(0x7f0000000540)=0x14) r7 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000780), &(0x7f0000000800)=0x58) accept4$nfc_llcp(r7, &(0x7f0000000880), &(0x7f0000000900)=0x58, 0x800) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={r3, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x16, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x8}, @generic={0x5, 0x7, 0x4, 0x8000, 0x80000001}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x569e}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', r6, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x0, 0x8, 0x8, 0x20}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000600)=[r8], &(0x7f0000000640)=[{0x2, 0x1, 0x3, 0x1}, {0x3, 0x2, 0x3}, {0x0, 0x2, 0x1, 0x6}, {0x3, 0x3, 0xd, 0xa}, {0x4, 0x1, 0x6, 0x6}, {0x5, 0x3, 0x8, 0xc}], 0x10, 0x2}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r3}, 0x4) r9 = openat$dir(0xffffff9c, &(0x7f0000000200)='./file0/file0\x00', 0x42603, 0x12c) r10 = openat$dir(0xffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x2000, 0x1c) linkat(r9, &(0x7f00000002c0)='./file0/file0\x00', r10, &(0x7f0000000340)='./file0/file0\x00', 0x400) 02:37:32 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x7fff, '\x00', 0x0, r1, 0x4, 0x1, 0x2}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xb76c, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x2, 0x0, r0, 0x8546, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2}, 0x48) (async) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r5, &(0x7f0000000000)="a1", 0x0}, 0x20) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000500)={@dev, 0x0}, &(0x7f0000000540)=0x14) r7 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000780), &(0x7f0000000800)=0x58) accept4$nfc_llcp(r7, &(0x7f0000000880), &(0x7f0000000900)=0x58, 0x800) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={r3, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x16, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x8}, @generic={0x5, 0x7, 0x4, 0x8000, 0x80000001}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x569e}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', r6, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x0, 0x8, 0x8, 0x20}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000600)=[r8], &(0x7f0000000640)=[{0x2, 0x1, 0x3, 0x1}, {0x3, 0x2, 0x3}, {0x0, 0x2, 0x1, 0x6}, {0x3, 0x3, 0xd, 0xa}, {0x4, 0x1, 0x6, 0x6}, {0x5, 0x3, 0x8, 0xc}], 0x10, 0x2}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r3}, 0x4) r9 = openat$dir(0xffffff9c, &(0x7f0000000200)='./file0/file0\x00', 0x42603, 0x12c) (async) r10 = openat$dir(0xffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x2000, 0x1c) linkat(r9, &(0x7f00000002c0)='./file0/file0\x00', r10, &(0x7f0000000340)='./file0/file0\x00', 0x400) 02:37:32 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DMA_BUF_SET_NAME_A(r0, 0x40046201, &(0x7f0000000580)='\'%\'\x00') ioctl$IOMMU_DESTROY$device(r0, 0x3b80, 0x0) openat$sndseq(0xffffff9c, &(0x7f0000000440), 0x410000) (async) r1 = openat$sndseq(0xffffff9c, &(0x7f0000000440), 0x410000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f00000003c0)={0xc, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000500)={{0x20, 0x1}, {0x5, 0x8}, 0x6, 0x6, 0x1}) (async) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000500)={{0x20, 0x1}, {0x5, 0x8}, 0x6, 0x6, 0x1}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r0, 0x3ba0, &(0x7f0000000400)={0x38, 0x2, r2}) (async) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r0, 0x3ba0, &(0x7f0000000400)={0x38, 0x2, r2}) getpeername$l2tp6(r0, &(0x7f0000000480), &(0x7f00000004c0)=0x20) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r3, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:32 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x7fff, '\x00', 0x0, r1, 0x4, 0x1, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xb76c, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x2, 0x0, r0, 0x8546, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2}, 0x48) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r5, &(0x7f0000000000)="a1", 0x0}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000500)={@dev, 0x0}, &(0x7f0000000540)=0x14) (async) r7 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000780), &(0x7f0000000800)=0x58) accept4$nfc_llcp(r7, &(0x7f0000000880), &(0x7f0000000900)=0x58, 0x800) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={r3, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x16, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x8}, @generic={0x5, 0x7, 0x4, 0x8000, 0x80000001}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x569e}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', r6, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x0, 0x8, 0x8, 0x20}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000600)=[r8], &(0x7f0000000640)=[{0x2, 0x1, 0x3, 0x1}, {0x3, 0x2, 0x3}, {0x0, 0x2, 0x1, 0x6}, {0x3, 0x3, 0xd, 0xa}, {0x4, 0x1, 0x6, 0x6}, {0x5, 0x3, 0x8, 0xc}], 0x10, 0x2}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r3}, 0x4) r9 = openat$dir(0xffffff9c, &(0x7f0000000200)='./file0/file0\x00', 0x42603, 0x12c) r10 = openat$dir(0xffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x2000, 0x1c) linkat(r9, &(0x7f00000002c0)='./file0/file0\x00', r10, &(0x7f0000000340)='./file0/file0\x00', 0x400) 02:37:32 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DMA_BUF_SET_NAME_A(r0, 0x40046201, &(0x7f0000000580)='\'%\'\x00') ioctl$IOMMU_DESTROY$device(r0, 0x3b80, 0x0) r1 = openat$sndseq(0xffffff9c, &(0x7f0000000440), 0x410000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f00000003c0)={0xc, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000500)={{0x20, 0x1}, {0x5, 0x8}, 0x6, 0x6, 0x1}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r0, 0x3ba0, &(0x7f0000000400)={0x38, 0x2, r2}) getpeername$l2tp6(r0, &(0x7f0000000480), &(0x7f00000004c0)=0x20) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r3, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$DMA_BUF_SET_NAME_A(r0, 0x40046201, &(0x7f0000000580)='\'%\'\x00') (async) ioctl$IOMMU_DESTROY$device(r0, 0x3b80, 0x0) (async) openat$sndseq(0xffffff9c, &(0x7f0000000440), 0x410000) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f00000003c0)={0xc}) (async) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000500)={{0x20, 0x1}, {0x5, 0x8}, 0x6, 0x6, 0x1}) (async) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r0, 0x3ba0, &(0x7f0000000400)={0x38, 0x2, r2}) (async) getpeername$l2tp6(r0, &(0x7f0000000480), &(0x7f00000004c0)=0x20) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r3, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:37:32 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x40, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:32 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x40, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x40, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:37:33 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x40, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x40, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:37:33 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f0000000040)={0xc, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r0, 0x3ba0, &(0x7f00000000c0)={0x38, 0x2, r1}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0xffffffc0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x4, 0x17, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x8, 0x7, 0x1, 0x101, 0x7fff}, @call={0x85, 0x0, 0x0, 0x5e}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0xe, '\x00', r4, 0x2c, r0, 0x8, &(0x7f00000005c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0x7, 0x0, 0x9b}, 0x10, r5, r0, 0x0, &(0x7f0000000680)=[r2, r2, r0, r3, r0, r3], 0x0, 0x10, 0x3}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:37:33 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1600) 02:37:33 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f0000000040)={0xc, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r0, 0x3ba0, &(0x7f00000000c0)={0x38, 0x2, r1}) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0xffffffc0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x4, 0x17, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x8, 0x7, 0x1, 0x101, 0x7fff}, @call={0x85, 0x0, 0x0, 0x5e}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0xe, '\x00', r4, 0x2c, r0, 0x8, &(0x7f00000005c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0x7, 0x0, 0x9b}, 0x10, r5, r0, 0x0, &(0x7f0000000680)=[r2, r2, r0, r3, r0, r3], 0x0, 0x10, 0x3}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:37:33 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1600) 02:37:33 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f0000000040)={0xc, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r0, 0x3ba0, &(0x7f00000000c0)={0x38, 0x2, r1}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0xffffffc0}, 0x8) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0xffffffc0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x4, 0x17, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x8, 0x7, 0x1, 0x101, 0x7fff}, @call={0x85, 0x0, 0x0, 0x5e}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0xe, '\x00', r4, 0x2c, r0, 0x8, &(0x7f00000005c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0x7, 0x0, 0x9b}, 0x10, r5, r0, 0x0, &(0x7f0000000680)=[r2, r2, r0, r3, r0, r3], 0x0, 0x10, 0x3}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x4, 0x17, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x8, 0x7, 0x1, 0x101, 0x7fff}, @call={0x85, 0x0, 0x0, 0x5e}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0xe, '\x00', r4, 0x2c, r0, 0x8, &(0x7f00000005c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0x7, 0x0, 0x9b}, 0x10, r5, r0, 0x0, &(0x7f0000000680)=[r2, r2, r0, r3, r0, r3], 0x0, 0x10, 0x3}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:37:33 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1600) 02:37:33 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) mknodat$null(r1, &(0x7f0000000100)='./file0\x00', 0x8, 0x103) linkat(r0, &(0x7f0000000000)='\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) syz_open_dev$dri(&(0x7f0000000080), 0x4, 0x20a43) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r1) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x80000) 02:37:34 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) mknodat$null(r1, &(0x7f0000000100)='./file0\x00', 0x8, 0x103) linkat(r0, &(0x7f0000000000)='\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) syz_open_dev$dri(&(0x7f0000000080), 0x4, 0x20a43) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r1) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x80000) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) (async) mknodat$null(r1, &(0x7f0000000100)='./file0\x00', 0x8, 0x103) (async) linkat(r0, &(0x7f0000000000)='\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) (async) syz_open_dev$dri(&(0x7f0000000080), 0x4, 0x20a43) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r1) (async) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x80000) (async) 02:37:34 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:34 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) (async) 02:37:34 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) mknodat$null(r1, &(0x7f0000000100)='./file0\x00', 0x8, 0x103) linkat(r0, &(0x7f0000000000)='\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) syz_open_dev$dri(&(0x7f0000000080), 0x4, 0x20a43) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r1) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x80000) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$RTC_WKALM_SET(r1, 0x4028700f, 0x0) (async) mknodat$null(r1, &(0x7f0000000100)='./file0\x00', 0x8, 0x103) (async) linkat(r0, &(0x7f0000000000)='\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) (async) syz_open_dev$dri(&(0x7f0000000080), 0x4, 0x20a43) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r1) (async) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x80000) (async) 02:37:34 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:35 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x488440) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x2, 0x1, 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000003c0)={&(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x1, 0x2, 0x3, 0x1}) ioctl$DRM_IOCTL_MODE_GETPLANE(r1, 0xc02064b6, &(0x7f0000000440)={r2, r3, r4, 0x0, 0x0, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 02:37:35 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000000)={@loopback, 0x0}, &(0x7f0000000040)=0x14) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@restrict={0xf, 0x0, 0x0, 0xb, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x7fff}}]}, {0x0, [0x5f, 0x61, 0x0, 0x0, 0x5f, 0x2e]}}, &(0x7f00000002c0)=""/249, 0x44, 0xf9, 0x0, 0x9}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', r0, r1, 0xffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) 02:37:35 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x488440) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x2, 0x1, 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000003c0)={&(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x1, 0x2, 0x3, 0x1}) ioctl$DRM_IOCTL_MODE_GETPLANE(r1, 0xc02064b6, &(0x7f0000000440)={r2, r3, r4, 0x0, 0x0, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x488440) (async) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x2, 0x1, 0x7}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000003c0)={&(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x1, 0x2, 0x3, 0x1}) (async) ioctl$DRM_IOCTL_MODE_GETPLANE(r1, 0xc02064b6, &(0x7f0000000440)={r2, r3, r4, 0x0, 0x0, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) 02:37:35 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000000)={@loopback, 0x0}, &(0x7f0000000040)=0x14) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@restrict={0xf, 0x0, 0x0, 0xb, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x7fff}}]}, {0x0, [0x5f, 0x61, 0x0, 0x0, 0x5f, 0x2e]}}, &(0x7f00000002c0)=""/249, 0x44, 0xf9, 0x0, 0x9}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', r0, r1, 0xffffffff, 0x4, 0x4}, 0x48) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', r0, r1, 0xffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r3}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) 02:37:35 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x488440) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1}) (async) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x2, 0x1, 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000003c0)={&(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x1, 0x2, 0x3, 0x1}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000003c0)={&(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x1, 0x2, 0x3, 0x1}) ioctl$DRM_IOCTL_MODE_GETPLANE(r1, 0xc02064b6, &(0x7f0000000440)={r2, r3, r4, 0x0, 0x0, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 02:37:35 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000000)={@loopback, 0x0}, &(0x7f0000000040)=0x14) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@restrict={0xf, 0x0, 0x0, 0xb, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x7fff}}]}, {0x0, [0x5f, 0x61, 0x0, 0x0, 0x5f, 0x2e]}}, &(0x7f00000002c0)=""/249, 0x44, 0xf9, 0x0, 0x9}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', r0, r1, 0xffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) 02:37:36 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000080)={&(0x7f0000000100)="6180eb81deb54a19cd39417df100d8897ae2bd3aaf6518701b05f06fa38719d01aecd7d4e50be1466ebbb0fb4205468e46aead60b84422ba1059fe33b893d6d5a0d036ac2ab09419dbf97eeea89e3bef74121b332f1b0c5cf0ac32d93e9a84b3cbf9202e47b09f4301ae289e", &(0x7f0000000180)=""/230, &(0x7f0000000280)="8837231340180cefb7758effe3a54c39f61c856c714f02772b18c4518ec24504f9fc0af5a70653193867cbac8a20ff9c74c9937f77820fa6c76a999c048fe594a6978b167d79d9fea65f76df0130fed54b21d701905fd16b94a8428519801b3004626abf61c426332eae2caf6e3ae086cf4c2f148ee476712114d7d3578ee61e6178b5745a2bbdd22028dcfe69cbe63f44775b14d780a5f23d03d97865fafd1ebda5351b1df40616a005049f81052daa6bc6ba99cae9f9316d9fd6a3740844dd137f8d78581eb408d04b0a132c489fd9fa55ad9e509bdb7548da262c2a243b1396f497de51eaf3e3e321e53b", &(0x7f0000000380)="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", 0x3, r0}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000025c0)={&(0x7f0000000480)="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", &(0x7f0000001480)=""/4096, &(0x7f0000002480)="3d0c146090b2ff6741ea447212389781830ac9b479eae0db3699e1651d0299e75cd82c6031fb4c4c5e6271a8282efe4e6590c79013233b8bfd88751ba83ad1c4aea3063f47c8036ab2c2382a6bba57d43f6f16bd0d29ca50c57fceca055cc0c5077ffed8a25d2998516cd59a58026ab7f868120731cf2d255fa915875e5162e325f3c45aca8ab5593ec5a19cc20ac295faef760b3624a2096d3991a5f1393bf66b70baecafc22b67ed4fe557", &(0x7f0000002540)="f5fa0953f675fe26bf1d5538169b026b7e4441294aaf4927449c2be86594ac7bcd008d0466e0afdcc7ee4425e0230033bff11061a422d17c56ad7354a7b1c5dbb36e3ec6a7a28eec0d1af2e66ca77f871d136dc099a315104ca0b2bb4ebabd17bbe7d5d47a084dea73b759b5242d2e02d2081c132c1e67d0", 0x3, r0, 0x4}, 0x38) 02:37:36 executing program 1: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x222500, 0x0) r1 = openat$dir(0xffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x4401, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', r1, &(0x7f0000000100)='./file0/file0\x00', 0x1400) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:37:36 executing program 1: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x222500, 0x0) (async) r1 = openat$dir(0xffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x4401, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', r1, &(0x7f0000000100)='./file0/file0\x00', 0x1400) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:37:36 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000080)={&(0x7f0000000100)="6180eb81deb54a19cd39417df100d8897ae2bd3aaf6518701b05f06fa38719d01aecd7d4e50be1466ebbb0fb4205468e46aead60b84422ba1059fe33b893d6d5a0d036ac2ab09419dbf97eeea89e3bef74121b332f1b0c5cf0ac32d93e9a84b3cbf9202e47b09f4301ae289e", &(0x7f0000000180)=""/230, &(0x7f0000000280)="8837231340180cefb7758effe3a54c39f61c856c714f02772b18c4518ec24504f9fc0af5a70653193867cbac8a20ff9c74c9937f77820fa6c76a999c048fe594a6978b167d79d9fea65f76df0130fed54b21d701905fd16b94a8428519801b3004626abf61c426332eae2caf6e3ae086cf4c2f148ee476712114d7d3578ee61e6178b5745a2bbdd22028dcfe69cbe63f44775b14d780a5f23d03d97865fafd1ebda5351b1df40616a005049f81052daa6bc6ba99cae9f9316d9fd6a3740844dd137f8d78581eb408d04b0a132c489fd9fa55ad9e509bdb7548da262c2a243b1396f497de51eaf3e3e321e53b", &(0x7f0000000380)="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", 0x3, r0}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000025c0)={&(0x7f0000000480)="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", &(0x7f0000001480)=""/4096, &(0x7f0000002480)="3d0c146090b2ff6741ea447212389781830ac9b479eae0db3699e1651d0299e75cd82c6031fb4c4c5e6271a8282efe4e6590c79013233b8bfd88751ba83ad1c4aea3063f47c8036ab2c2382a6bba57d43f6f16bd0d29ca50c57fceca055cc0c5077ffed8a25d2998516cd59a58026ab7f868120731cf2d255fa915875e5162e325f3c45aca8ab5593ec5a19cc20ac295faef760b3624a2096d3991a5f1393bf66b70baecafc22b67ed4fe557", &(0x7f0000002540)="f5fa0953f675fe26bf1d5538169b026b7e4441294aaf4927449c2be86594ac7bcd008d0466e0afdcc7ee4425e0230033bff11061a422d17c56ad7354a7b1c5dbb36e3ec6a7a28eec0d1af2e66ca77f871d136dc099a315104ca0b2bb4ebabd17bbe7d5d47a084dea73b759b5242d2e02d2081c132c1e67d0", 0x3, r0, 0x4}, 0x38) 02:37:36 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000080)={&(0x7f0000000100)="6180eb81deb54a19cd39417df100d8897ae2bd3aaf6518701b05f06fa38719d01aecd7d4e50be1466ebbb0fb4205468e46aead60b84422ba1059fe33b893d6d5a0d036ac2ab09419dbf97eeea89e3bef74121b332f1b0c5cf0ac32d93e9a84b3cbf9202e47b09f4301ae289e", &(0x7f0000000180)=""/230, &(0x7f0000000280)="8837231340180cefb7758effe3a54c39f61c856c714f02772b18c4518ec24504f9fc0af5a70653193867cbac8a20ff9c74c9937f77820fa6c76a999c048fe594a6978b167d79d9fea65f76df0130fed54b21d701905fd16b94a8428519801b3004626abf61c426332eae2caf6e3ae086cf4c2f148ee476712114d7d3578ee61e6178b5745a2bbdd22028dcfe69cbe63f44775b14d780a5f23d03d97865fafd1ebda5351b1df40616a005049f81052daa6bc6ba99cae9f9316d9fd6a3740844dd137f8d78581eb408d04b0a132c489fd9fa55ad9e509bdb7548da262c2a243b1396f497de51eaf3e3e321e53b", &(0x7f0000000380)="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", 0x3, r0}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000025c0)={&(0x7f0000000480)="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", &(0x7f0000001480)=""/4096, &(0x7f0000002480)="3d0c146090b2ff6741ea447212389781830ac9b479eae0db3699e1651d0299e75cd82c6031fb4c4c5e6271a8282efe4e6590c79013233b8bfd88751ba83ad1c4aea3063f47c8036ab2c2382a6bba57d43f6f16bd0d29ca50c57fceca055cc0c5077ffed8a25d2998516cd59a58026ab7f868120731cf2d255fa915875e5162e325f3c45aca8ab5593ec5a19cc20ac295faef760b3624a2096d3991a5f1393bf66b70baecafc22b67ed4fe557", &(0x7f0000002540)="f5fa0953f675fe26bf1d5538169b026b7e4441294aaf4927449c2be86594ac7bcd008d0466e0afdcc7ee4425e0230033bff11061a422d17c56ad7354a7b1c5dbb36e3ec6a7a28eec0d1af2e66ca77f871d136dc099a315104ca0b2bb4ebabd17bbe7d5d47a084dea73b759b5242d2e02d2081c132c1e67d0", 0x3, r0, 0x4}, 0x38) 02:37:36 executing program 1: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x222500, 0x0) (async) r1 = openat$dir(0xffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x4401, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', r1, &(0x7f0000000100)='./file0/file0\x00', 0x1400) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:37:37 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) mknodat$null(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x103) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x1d, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_fd={0x18, 0x7, 0x1, 0x0, r0}, @jmp={0x5, 0x1, 0xd, 0x0, 0xb, 0x20, 0x4}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xd}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x1, 0x2, 0x0, r0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x7fff, 0x0, &(0x7f0000000200), 0x41100, 0x60, '\x00', r2, 0x0, r0, 0x8, &(0x7f0000000540)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xc, 0x10000}, 0x10, 0x55e7, r0, 0x7, &(0x7f0000000600)=[r3, r0], &(0x7f0000000640)=[{0x1, 0x2, 0x1, 0x9}, {0x3, 0x3, 0x2, 0x1d}, {0x3, 0x3, 0x0, 0x3}, {0x1, 0x3, 0xc, 0x9}, {0x0, 0x4, 0x5, 0x9}, {0x3, 0x2, 0x9, 0xa}, {0x1, 0x1, 0xf, 0x5}], 0x10, 0x2}, 0x90) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000200)) 02:37:37 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:37:37 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:37:37 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) mknodat$null(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x103) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x1d, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_fd={0x18, 0x7, 0x1, 0x0, r0}, @jmp={0x5, 0x1, 0xd, 0x0, 0xb, 0x20, 0x4}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xd}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x1, 0x2, 0x0, r0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x7fff, 0x0, &(0x7f0000000200), 0x41100, 0x60, '\x00', r2, 0x0, r0, 0x8, &(0x7f0000000540)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xc, 0x10000}, 0x10, 0x55e7, r0, 0x7, &(0x7f0000000600)=[r3, r0], &(0x7f0000000640)=[{0x1, 0x2, 0x1, 0x9}, {0x3, 0x3, 0x2, 0x1d}, {0x3, 0x3, 0x0, 0x3}, {0x1, 0x3, 0xc, 0x9}, {0x0, 0x4, 0x5, 0x9}, {0x3, 0x2, 0x9, 0xa}, {0x1, 0x1, 0xf, 0x5}], 0x10, 0x2}, 0x90) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000200)) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) mknodat$null(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x103) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6}, 0xc) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x1d, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_fd={0x18, 0x7, 0x1, 0x0, r0}, @jmp={0x5, 0x1, 0xd, 0x0, 0xb, 0x20, 0x4}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xd}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x1, 0x2, 0x0, r0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x7fff, 0x0, &(0x7f0000000200), 0x41100, 0x60, '\x00', r2, 0x0, r0, 0x8, &(0x7f0000000540)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xc, 0x10000}, 0x10, 0x55e7, r0, 0x7, &(0x7f0000000600)=[r3, r0], &(0x7f0000000640)=[{0x1, 0x2, 0x1, 0x9}, {0x3, 0x3, 0x2, 0x1d}, {0x3, 0x3, 0x0, 0x3}, {0x1, 0x3, 0xc, 0x9}, {0x0, 0x4, 0x5, 0x9}, {0x3, 0x2, 0x9, 0xa}, {0x1, 0x1, 0xf, 0x5}], 0x10, 0x2}, 0x90) (async) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000200)) (async) 02:37:37 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840), 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:37:37 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) mknodat$null(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x103) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x1d, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_fd={0x18, 0x7, 0x1, 0x0, r0}, @jmp={0x5, 0x1, 0xd, 0x0, 0xb, 0x20, 0x4}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xd}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x1, 0x2, 0x0, r0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x7fff, 0x0, &(0x7f0000000200), 0x41100, 0x60, '\x00', r2, 0x0, r0, 0x8, &(0x7f0000000540)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xc, 0x10000}, 0x10, 0x55e7, r0, 0x7, &(0x7f0000000600)=[r3, r0], &(0x7f0000000640)=[{0x1, 0x2, 0x1, 0x9}, {0x3, 0x3, 0x2, 0x1d}, {0x3, 0x3, 0x0, 0x3}, {0x1, 0x3, 0xc, 0x9}, {0x0, 0x4, 0x5, 0x9}, {0x3, 0x2, 0x9, 0xa}, {0x1, 0x1, 0xf, 0x5}], 0x10, 0x2}, 0x90) (async) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000200)) 02:37:37 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf16f}, {}, {}, [@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='syzkaller\x00', 0x9, 0xa6, &(0x7f0000000400)=""/166, 0x41000, 0x9, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0xd, 0x80000001, 0x6}, 0x10, 0xf572, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, r1, r0, r1, r1, r1], 0x0, 0x10, 0x9}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0x28, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf7a0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @alu={0x7, 0x0, 0x6, 0x7, 0x0, 0xffffffffffffffff, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @generic={0x78, 0x5, 0x2, 0xb140, 0x100}]}, &(0x7f0000000000)='GPL\x00', 0xe156, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x1a, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x5, 0x5, 0xfffffffc, 0x1}, 0x10, 0x22a90, r3, 0x5, &(0x7f0000000600)=[r1], &(0x7f0000000640)=[{0x5, 0x5, 0x1, 0x9}, {0x0, 0x4, 0x1, 0x4}, {0x3, 0x3, 0xb, 0x5}, {0x4, 0x2, 0x9, 0x3}, {0x2, 0x5, 0x0, 0x5}], 0x10, 0x5}, 0x90) 02:37:38 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) socket$nl_rdma(0x10, 0x3, 0x14) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f00000001c0)={r1, 0xff9f77cc512e48cc}) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x20003, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x1412, 0x1, 0x70bd26, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x1}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x840}, 0x40000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000100)) 02:37:38 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) (async) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf16f}, {}, {}, [@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='syzkaller\x00', 0x9, 0xa6, &(0x7f0000000400)=""/166, 0x41000, 0x9, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0xd, 0x80000001, 0x6}, 0x10, 0xf572, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, r1, r0, r1, r1, r1], 0x0, 0x10, 0x9}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0x28, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf7a0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @alu={0x7, 0x0, 0x6, 0x7, 0x0, 0xffffffffffffffff, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @generic={0x78, 0x5, 0x2, 0xb140, 0x100}]}, &(0x7f0000000000)='GPL\x00', 0xe156, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x1a, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x5, 0x5, 0xfffffffc, 0x1}, 0x10, 0x22a90, r3, 0x5, &(0x7f0000000600)=[r1], &(0x7f0000000640)=[{0x5, 0x5, 0x1, 0x9}, {0x0, 0x4, 0x1, 0x4}, {0x3, 0x3, 0xb, 0x5}, {0x4, 0x2, 0x9, 0x3}, {0x2, 0x5, 0x0, 0x5}], 0x10, 0x5}, 0x90) 02:37:38 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) socket$nl_rdma(0x10, 0x3, 0x14) (async) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f00000001c0)={r1, 0xff9f77cc512e48cc}) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x20003, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x1412, 0x1, 0x70bd26, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x1}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x840}, 0x40000) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000100)) 02:37:38 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async, rerun: 32) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) (rerun: 32) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf16f}, {}, {}, [@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='syzkaller\x00', 0x9, 0xa6, &(0x7f0000000400)=""/166, 0x41000, 0x9, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0xd, 0x80000001, 0x6}, 0x10, 0xf572, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, r1, r0, r1, r1, r1], 0x0, 0x10, 0x9}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0x28, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf7a0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @alu={0x7, 0x0, 0x6, 0x7, 0x0, 0xffffffffffffffff, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @generic={0x78, 0x5, 0x2, 0xb140, 0x100}]}, &(0x7f0000000000)='GPL\x00', 0xe156, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x1a, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x5, 0x5, 0xfffffffc, 0x1}, 0x10, 0x22a90, r3, 0x5, &(0x7f0000000600)=[r1], &(0x7f0000000640)=[{0x5, 0x5, 0x1, 0x9}, {0x0, 0x4, 0x1, 0x4}, {0x3, 0x3, 0xb, 0x5}, {0x4, 0x2, 0x9, 0x3}, {0x2, 0x5, 0x0, 0x5}], 0x10, 0x5}, 0x90) 02:37:38 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:38 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) socket$nl_rdma(0x10, 0x3, 0x14) (async) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f00000001c0)={r1, 0xff9f77cc512e48cc}) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x20003, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x1412, 0x1, 0x70bd26, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x1}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x840}, 0x40000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000100)) 02:37:38 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:38 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r0, r0}, 0xc) 02:37:39 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r0, r0}, 0xc) 02:37:39 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:39 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r0, r0}, 0xc) 02:37:39 executing program 0: shmctl$IPC_RMID(0x0, 0x0) r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$rtc(0xffffff9c, &(0x7f0000000180), 0x88000, 0x0) openat$rtc(0xffffff9c, &(0x7f00000001c0), 0x80400, 0x0) accept$nfc_llcp(r0, &(0x7f0000000100), &(0x7f0000000080)=0x58) 02:37:39 executing program 0: shmctl$IPC_RMID(0x0, 0x0) (async) shmctl$IPC_RMID(0x0, 0x0) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$rtc(0xffffff9c, &(0x7f0000000180), 0x88000, 0x0) openat$rtc(0xffffff9c, &(0x7f00000001c0), 0x80400, 0x0) accept$nfc_llcp(r0, &(0x7f0000000100), &(0x7f0000000080)=0x58) 02:37:39 executing program 0: shmctl$IPC_RMID(0x0, 0x0) r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) openat$rtc(0xffffff9c, &(0x7f0000000180), 0x88000, 0x0) (async) openat$rtc(0xffffff9c, &(0x7f00000001c0), 0x80400, 0x0) (async) accept$nfc_llcp(r0, &(0x7f0000000100), &(0x7f0000000080)=0x58) 02:37:40 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = openat$iommufd(0xffffff9c, &(0x7f0000000000), 0x401, 0x0) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(0xffffffffffffffff, 0x3ba0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0}) ioctl$IOMMU_DESTROY$device(r2, 0x3b80, &(0x7f00000000c0)={0x8, r3}) 02:37:40 executing program 0: r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)={0xffffffffffffffff}, 0x2}}, 0x20) r3 = openat$rdma_cm(0xffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000600)={0x12, 0x10, 0xfa00, {&(0x7f00000005c0), r2, r1}}, 0x18) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2, 0x9}}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r4, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:40 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = openat$iommufd(0xffffff9c, &(0x7f0000000000), 0x401, 0x0) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(0xffffffffffffffff, 0x3ba0, &(0x7f0000000040)={0x38}) (async) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(0xffffffffffffffff, 0x3ba0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0}) ioctl$IOMMU_DESTROY$device(r2, 0x3b80, &(0x7f00000000c0)={0x8, r3}) (async) ioctl$IOMMU_DESTROY$device(r2, 0x3b80, &(0x7f00000000c0)={0x8, r3}) 02:37:40 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async, rerun: 32) r2 = openat$iommufd(0xffffff9c, &(0x7f0000000000), 0x401, 0x0) (rerun: 32) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(0xffffffffffffffff, 0x3ba0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0}) ioctl$IOMMU_DESTROY$device(r2, 0x3b80, &(0x7f00000000c0)={0x8, r3}) 02:37:41 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000800), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000a00)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x8, 0x1, 0x5}) ioctl$DRM_IOCTL_MODE_GETENCODER(r1, 0xc01464a6, &(0x7f0000000a40)={r4}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000000)={@map=r3, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="00b99cc772b0adae15545e000000000000000000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x7, 0xe1, &(0x7f00000002c0)=""/225, 0x41100, 0x70, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000600)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000006c0)=[r5], &(0x7f0000000700)=[{0x4, 0x4, 0x5, 0xc}, {0x2, 0x4, 0x5, 0x8}, {0x1, 0x4, 0xc, 0xc}, {0x1, 0x4, 0x7}], 0x10, 0x1}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r6}, 0x18) 02:37:41 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000800), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000a00)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x8, 0x1, 0x5}) ioctl$DRM_IOCTL_MODE_GETENCODER(r1, 0xc01464a6, &(0x7f0000000a40)={r4}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000000)={@map=r3, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="00b99cc772b0adae15545e000000000000000000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x7, 0xe1, &(0x7f00000002c0)=""/225, 0x41100, 0x70, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000600)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000006c0)=[r5], &(0x7f0000000700)=[{0x4, 0x4, 0x5, 0xc}, {0x2, 0x4, 0x5, 0x8}, {0x1, 0x4, 0xc, 0xc}, {0x1, 0x4, 0x7}], 0x10, 0x1}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r6}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000800), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) (async) openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000a00)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x8, 0x1, 0x5}) (async) ioctl$DRM_IOCTL_MODE_GETENCODER(r1, 0xc01464a6, &(0x7f0000000a40)={r4}) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000000)={@map=r3, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="00b99cc772b0adae15545e000000000000000000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x7, 0xe1, &(0x7f00000002c0)=""/225, 0x41100, 0x70, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000600)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000006c0)=[r5], &(0x7f0000000700)=[{0x4, 0x4, 0x5, 0xc}, {0x2, 0x4, 0x5, 0x8}, {0x1, 0x4, 0xc, 0xc}, {0x1, 0x4, 0x7}], 0x10, 0x1}, 0x90) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r6}, 0x18) (async) 02:37:42 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000800), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000a00)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x8, 0x1, 0x5}) ioctl$DRM_IOCTL_MODE_GETENCODER(r1, 0xc01464a6, &(0x7f0000000a40)={r4}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000000)={@map=r3, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="00b99cc772b0adae15545e000000000000000000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x7, 0xe1, &(0x7f00000002c0)=""/225, 0x41100, 0x70, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000600)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000006c0)=[r5], &(0x7f0000000700)=[{0x4, 0x4, 0x5, 0xc}, {0x2, 0x4, 0x5, 0x8}, {0x1, 0x4, 0xc, 0xc}, {0x1, 0x4, 0x7}], 0x10, 0x1}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r6}, 0x18) 02:37:42 executing program 0: r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r3 = openat$rdma_cm(0xffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000600)={0x12, 0x10, 0xfa00, {&(0x7f00000005c0), r2, r1}}, 0x18) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2, 0x9}}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r4, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:42 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bind$nfc_llcp(r2, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r2, r0}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:43 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bind$nfc_llcp(r2, 0x0, 0x0) (async, rerun: 64) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r2, r0}, 0xc) (rerun: 64) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:43 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bind$nfc_llcp(r2, 0x0, 0x0) (async) bind$nfc_llcp(r2, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r2, r0}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:44 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r2, 0xc06864ce, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000040)={@private2, 0x0}, &(0x7f00000000c0)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2, 0x1}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x53, 0x0, 0xc, 0x4}, @union={0x3, 0x1, 0x0, 0x5, 0x1, 0x9, [{0x5, 0x2, 0x1}]}, @typedef={0x10, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x2e]}}, &(0x7f0000000100), 0x5f, 0x0, 0x0, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000880)={r1, 0xffffffffffffffff}, 0x4) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000008c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) r8 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) accept4$nfc_llcp(r8, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_lsm={0x1d, 0x24, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10001}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x7}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x4, 0x6, 0x4, 0x18, 0xfffffffffffffffc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x57}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0xd3488ca6063c0dae}}]}, &(0x7f0000000000)='syzkaller\x00', 0x7, 0xb4, &(0x7f0000000180)=""/180, 0x40f00, 0x8, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000004c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0x8, 0x2, 0xed}, 0x10, r5, 0x0, 0x2, &(0x7f0000000940)=[r6, r1, r1, r0, r1, r7, r0, r8], &(0x7f0000000980)=[{0x4, 0x2, 0x4}, {0x2, 0x5, 0xf, 0x9}], 0x10, 0x1}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:44 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r2, 0xc06864ce, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000040)={@private2, 0x0}, &(0x7f00000000c0)=0x14) (async) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2, 0x1}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x53, 0x0, 0xc, 0x4}, @union={0x3, 0x1, 0x0, 0x5, 0x1, 0x9, [{0x5, 0x2, 0x1}]}, @typedef={0x10, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x2e]}}, &(0x7f0000000100), 0x5f, 0x0, 0x0, 0x9}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000880)={r1, 0xffffffffffffffff}, 0x4) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000008c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) (async, rerun: 32) r8 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) accept4$nfc_llcp(r8, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_lsm={0x1d, 0x24, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10001}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x7}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x4, 0x6, 0x4, 0x18, 0xfffffffffffffffc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x57}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0xd3488ca6063c0dae}}]}, &(0x7f0000000000)='syzkaller\x00', 0x7, 0xb4, &(0x7f0000000180)=""/180, 0x40f00, 0x8, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000004c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0x8, 0x2, 0xed}, 0x10, r5, 0x0, 0x2, &(0x7f0000000940)=[r6, r1, r1, r0, r1, r7, r0, r8], &(0x7f0000000980)=[{0x4, 0x2, 0x4}, {0x2, 0x5, 0xf, 0x9}], 0x10, 0x1}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:45 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r2, 0xc06864ce, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000040)={@private2, 0x0}, &(0x7f00000000c0)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2, 0x1}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x53, 0x0, 0xc, 0x4}, @union={0x3, 0x1, 0x0, 0x5, 0x1, 0x9, [{0x5, 0x2, 0x1}]}, @typedef={0x10, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x2e]}}, &(0x7f0000000100), 0x5f, 0x0, 0x0, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000880)={r1, 0xffffffffffffffff}, 0x4) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000008c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) r8 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) accept4$nfc_llcp(r8, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_lsm={0x1d, 0x24, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10001}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x7}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x4, 0x6, 0x4, 0x18, 0xfffffffffffffffc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x57}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0xd3488ca6063c0dae}}]}, &(0x7f0000000000)='syzkaller\x00', 0x7, 0xb4, &(0x7f0000000180)=""/180, 0x40f00, 0x8, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000004c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0x8, 0x2, 0xed}, 0x10, r5, 0x0, 0x2, &(0x7f0000000940)=[r6, r1, r1, r0, r1, r7, r0, r8], &(0x7f0000000980)=[{0x4, 0x2, 0x4}, {0x2, 0x5, 0xf, 0x9}], 0x10, 0x1}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETFB2(r2, 0xc06864ce, 0x0) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000040)={@private2}, &(0x7f00000000c0)=0x14) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2, 0x1}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x53, 0x0, 0xc, 0x4}, @union={0x3, 0x1, 0x0, 0x5, 0x1, 0x9, [{0x5, 0x2, 0x1}]}, @typedef={0x10, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x2e]}}, &(0x7f0000000100), 0x5f, 0x0, 0x0, 0x9}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000880)={r1}, 0x4) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000008c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) (async) openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) accept4$nfc_llcp(r8, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_lsm={0x1d, 0x24, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10001}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x7}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x4, 0x6, 0x4, 0x18, 0xfffffffffffffffc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x57}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0xd3488ca6063c0dae}}]}, &(0x7f0000000000)='syzkaller\x00', 0x7, 0xb4, &(0x7f0000000180)=""/180, 0x40f00, 0x8, '\x00', r3, 0x1b, r4, 0x8, &(0x7f00000004c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0x8, 0x2, 0xed}, 0x10, r5, 0x0, 0x2, &(0x7f0000000940)=[r6, r1, r1, r0, r1, r7, r0, r8], &(0x7f0000000980)=[{0x4, 0x2, 0x4}, {0x2, 0x5, 0xf, 0x9}], 0x10, 0x1}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) 02:37:45 executing program 0: r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r3 = openat$rdma_cm(0xffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000600)={0x12, 0x10, 0xfa00, {&(0x7f00000005c0), r2, r1}}, 0x18) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2, 0x9}}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r4, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:45 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x40, 0x0}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={0xffffffffffffffff, 0xe0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001880)=[{}, {}], 0x10, 0x10, &(0x7f00000018c0), &(0x7f0000001900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001940)}}, 0x10) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c00)={0x5bddca26b088bbef, 0x10, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, [@printk={@x}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ldst={0x0, 0x2, 0x1, 0x7, 0x0, 0xffffffffffffffe0, 0x4}]}, &(0x7f0000000600)='syzkaller\x00', 0x80000000, 0x1000, &(0x7f0000000880)=""/4096, 0x40f00, 0x20, '\x00', r3, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ac0)={0x5, 0x8, 0x20, 0x2}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000001b00)=[r0, r0, r0, r1, r4], &(0x7f0000001b40)=[{0x5, 0x4, 0xb, 0x4}, {0x2, 0x1, 0x9, 0x7}, {0x0, 0x1, 0x8, 0xc}, {0x4, 0x1, 0x1, 0x6}, {0x5, 0x5, 0xb, 0x4}, {0x3, 0x5, 0xb, 0x9}, {0x4, 0x4, 0xa, 0xb}, {0x4, 0x5, 0x9, 0x2}, {0x2, 0x5, 0x10, 0xc}], 0x10, 0x7}, 0x90) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x12, &(0x7f00000003c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x7}, @ldst={0x3, 0x2, 0x0, 0x6, 0x0, 0x30, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x2}, @ldst={0x0, 0x3, 0x6, 0xa, 0x5, 0x80, 0x8}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1e10}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xb}], &(0x7f0000000480)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0xd, 0x1000, 0x9}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xd, 0x6, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @generic={0x2, 0xe, 0x3, 0x3f, 0x80000001}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000100)='GPL\x00', 0x7f, 0xe5, &(0x7f00000002c0)=""/229, 0x40f00, 0x5b, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x1, 0x6, 0xae64}, 0x10, r2, r5, 0x0, &(0x7f0000000600), 0x0, 0x10, 0xfffffffe}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r6}, 0x18) 02:37:46 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x40, 0x0}, 0x8) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={0xffffffffffffffff, 0xe0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001880)=[{}, {}], 0x10, 0x10, &(0x7f00000018c0), &(0x7f0000001900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001940)}}, 0x10) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c00)={0x5bddca26b088bbef, 0x10, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, [@printk={@x}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ldst={0x0, 0x2, 0x1, 0x7, 0x0, 0xffffffffffffffe0, 0x4}]}, &(0x7f0000000600)='syzkaller\x00', 0x80000000, 0x1000, &(0x7f0000000880)=""/4096, 0x40f00, 0x20, '\x00', r3, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ac0)={0x5, 0x8, 0x20, 0x2}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000001b00)=[r0, r0, r0, r1, r4], &(0x7f0000001b40)=[{0x5, 0x4, 0xb, 0x4}, {0x2, 0x1, 0x9, 0x7}, {0x0, 0x1, 0x8, 0xc}, {0x4, 0x1, 0x1, 0x6}, {0x5, 0x5, 0xb, 0x4}, {0x3, 0x5, 0xb, 0x9}, {0x4, 0x4, 0xa, 0xb}, {0x4, 0x5, 0x9, 0x2}, {0x2, 0x5, 0x10, 0xc}], 0x10, 0x7}, 0x90) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x12, &(0x7f00000003c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x7}, @ldst={0x3, 0x2, 0x0, 0x6, 0x0, 0x30, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x2}, @ldst={0x0, 0x3, 0x6, 0xa, 0x5, 0x80, 0x8}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1e10}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xb}], &(0x7f0000000480)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0xd, 0x1000, 0x9}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xd, 0x6, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @generic={0x2, 0xe, 0x3, 0x3f, 0x80000001}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000100)='GPL\x00', 0x7f, 0xe5, &(0x7f00000002c0)=""/229, 0x40f00, 0x5b, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x1, 0x6, 0xae64}, 0x10, r2, r5, 0x0, &(0x7f0000000600), 0x0, 0x10, 0xfffffffe}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r6}, 0x18) 02:37:47 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x40, 0x0}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={0xffffffffffffffff, 0xe0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001880)=[{}, {}], 0x10, 0x10, &(0x7f00000018c0), &(0x7f0000001900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001940)}}, 0x10) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c00)={0x5bddca26b088bbef, 0x10, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, [@printk={@x}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ldst={0x0, 0x2, 0x1, 0x7, 0x0, 0xffffffffffffffe0, 0x4}]}, &(0x7f0000000600)='syzkaller\x00', 0x80000000, 0x1000, &(0x7f0000000880)=""/4096, 0x40f00, 0x20, '\x00', r3, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ac0)={0x5, 0x8, 0x20, 0x2}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000001b00)=[r0, r0, r0, r1, r4], &(0x7f0000001b40)=[{0x5, 0x4, 0xb, 0x4}, {0x2, 0x1, 0x9, 0x7}, {0x0, 0x1, 0x8, 0xc}, {0x4, 0x1, 0x1, 0x6}, {0x5, 0x5, 0xb, 0x4}, {0x3, 0x5, 0xb, 0x9}, {0x4, 0x4, 0xa, 0xb}, {0x4, 0x5, 0x9, 0x2}, {0x2, 0x5, 0x10, 0xc}], 0x10, 0x7}, 0x90) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x12, &(0x7f00000003c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x7}, @ldst={0x3, 0x2, 0x0, 0x6, 0x0, 0x30, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x2}, @ldst={0x0, 0x3, 0x6, 0xa, 0x5, 0x80, 0x8}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1e10}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xb}], &(0x7f0000000480)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0xd, 0x1000, 0x9}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xd, 0x6, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @generic={0x2, 0xe, 0x3, 0x3f, 0x80000001}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000100)='GPL\x00', 0x7f, 0xe5, &(0x7f00000002c0)=""/229, 0x40f00, 0x5b, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x1, 0x6, 0xae64}, 0x10, r2, r5, 0x0, &(0x7f0000000600), 0x0, 0x10, 0xfffffffe}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r6}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x40}, 0x8) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={0xffffffffffffffff, 0xe0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000780)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000001880)=[{}, {}], 0x10, 0x10, &(0x7f00000018c0), &(0x7f0000001900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001940)}}, 0x10) (async) openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c00)={0x5bddca26b088bbef, 0x10, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, [@printk={@x}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ldst={0x0, 0x2, 0x1, 0x7, 0x0, 0xffffffffffffffe0, 0x4}]}, &(0x7f0000000600)='syzkaller\x00', 0x80000000, 0x1000, &(0x7f0000000880)=""/4096, 0x40f00, 0x20, '\x00', r3, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ac0)={0x5, 0x8, 0x20, 0x2}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000001b00)=[r0, r0, r0, r1, r4], &(0x7f0000001b40)=[{0x5, 0x4, 0xb, 0x4}, {0x2, 0x1, 0x9, 0x7}, {0x0, 0x1, 0x8, 0xc}, {0x4, 0x1, 0x1, 0x6}, {0x5, 0x5, 0xb, 0x4}, {0x3, 0x5, 0xb, 0x9}, {0x4, 0x4, 0xa, 0xb}, {0x4, 0x5, 0x9, 0x2}, {0x2, 0x5, 0x10, 0xc}], 0x10, 0x7}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x12, &(0x7f00000003c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x7}, @ldst={0x3, 0x2, 0x0, 0x6, 0x0, 0x30, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x2}, @ldst={0x0, 0x3, 0x6, 0xa, 0x5, 0x80, 0x8}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1e10}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xb}], &(0x7f0000000480)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0xd, 0x1000, 0x9}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xd, 0x6, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @generic={0x2, 0xe, 0x3, 0x3f, 0x80000001}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000100)='GPL\x00', 0x7f, 0xe5, &(0x7f00000002c0)=""/229, 0x40f00, 0x5b, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x1, 0x6, 0xae64}, 0x10, r2, r5, 0x0, &(0x7f0000000600), 0x0, 0x10, 0xfffffffe}, 0x90) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r6}, 0x18) (async) 02:37:47 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x31, &(0x7f0000000000)={@private0, 0x0}, &(0x7f0000000040)=0x14) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x800000, '\x00', r0, 0xffffffffffffffff, 0x2000002, 0x2, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:47 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x31, &(0x7f0000000000)={@private0, 0x0}, &(0x7f0000000040)=0x14) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x800000, '\x00', r0, 0xffffffffffffffff, 0x2000002, 0x2, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:47 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x31, &(0x7f0000000000)={@private0, 0x0}, &(0x7f0000000040)=0x14) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x800000, '\x00', r0, 0xffffffffffffffff, 0x2000002, 0x2, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:37:48 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) 02:37:48 executing program 0: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000100)={@my=0x0}) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$tun(0xffffff9c, &(0x7f0000000140), 0x206800, 0x0) 02:37:48 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) 02:37:48 executing program 0: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000100)={@my=0x0}) (async, rerun: 64) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (rerun: 64) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$tun(0xffffff9c, &(0x7f0000000140), 0x206800, 0x0) 02:37:48 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) 02:37:48 executing program 0: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000100)={@my=0x0}) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$tun(0xffffff9c, &(0x7f0000000140), 0x206800, 0x0) 02:37:48 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = syz_open_dev$dri(&(0x7f0000000000), 0xa4e, 0x4100) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x2, &(0x7f0000000200)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f00000003c0)='GPL\x00', 0x4, 0xe6, &(0x7f0000000400)=""/230, 0x40f00, 0x24, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000880)=[r0, r1, r0, r0, r1, r0, r1, r0, r1, r0], &(0x7f00000008c0)=[{0x2, 0x4, 0x1, 0x1}, {0x1, 0x3, 0x0, 0x1}, {0x3, 0x4, 0x5, 0xb}, {0x1, 0x1, 0xa, 0x7}, {0x3, 0x5, 0x4, 0xa}], 0x10, 0x6}, 0x90) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f0000000180)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[{}, {}, {}], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0], 0x3, 0x1, 0x4}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a00)={0x1b, 0x0, 0x0, 0xfffff8f3, 0x0, 0x1, 0x7, '\x00', r3, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000a80), &(0x7f0000000ac0)=r4}, 0x20) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001dc0)={&(0x7f0000001c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@restrict={0x1, 0x0, 0x0, 0xb, 0x5}, @volatile={0xf}, @const={0x9, 0x0, 0x0, 0xa, 0x3}, @fwd={0x9}]}, {0x0, [0x30, 0x30, 0x5f, 0x2e, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000001d00)=""/176, 0x52, 0xb0, 0x1, 0x3}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001ec0)=@bpf_tracing={0x1a, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc1b, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @map_fd={0x18, 0x3, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000c40)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000c80)=""/4096, 0x0, 0x14, '\x00', r3, 0x1c, r8, 0x8, &(0x7f0000001e00)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000001e40)={0x1, 0x9, 0x3}, 0x10, 0x2b202, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000001e80)=[{0x2, 0x2, 0x10, 0x5}, {0x2, 0x4, 0xa, 0x8}], 0x10, 0x8}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:49 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) renameat2(r0, &(0x7f0000000080)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x2) 02:37:49 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = syz_open_dev$dri(&(0x7f0000000000), 0xa4e, 0x4100) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x2, &(0x7f0000000200)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f00000003c0)='GPL\x00', 0x4, 0xe6, &(0x7f0000000400)=""/230, 0x40f00, 0x24, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000880)=[r0, r1, r0, r0, r1, r0, r1, r0, r1, r0], &(0x7f00000008c0)=[{0x2, 0x4, 0x1, 0x1}, {0x1, 0x3, 0x0, 0x1}, {0x3, 0x4, 0x5, 0xb}, {0x1, 0x1, 0xa, 0x7}, {0x3, 0x5, 0x4, 0xa}], 0x10, 0x6}, 0x90) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f0000000180)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[{}, {}, {}], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0], 0x3, 0x1, 0x4}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a00)={0x1b, 0x0, 0x0, 0xfffff8f3, 0x0, 0x1, 0x7, '\x00', r3, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000a80), &(0x7f0000000ac0)=r4}, 0x20) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001dc0)={&(0x7f0000001c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@restrict={0x1, 0x0, 0x0, 0xb, 0x5}, @volatile={0xf}, @const={0x9, 0x0, 0x0, 0xa, 0x3}, @fwd={0x9}]}, {0x0, [0x30, 0x30, 0x5f, 0x2e, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000001d00)=""/176, 0x52, 0xb0, 0x1, 0x3}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001ec0)=@bpf_tracing={0x1a, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc1b, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @map_fd={0x18, 0x3, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000c40)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000c80)=""/4096, 0x0, 0x14, '\x00', r3, 0x1c, r8, 0x8, &(0x7f0000001e00)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000001e40)={0x1, 0x9, 0x3}, 0x10, 0x2b202, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000001e80)=[{0x2, 0x2, 0x10, 0x5}, {0x2, 0x4, 0xa, 0x8}], 0x10, 0x8}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) syz_open_dev$dri(&(0x7f0000000000), 0xa4e, 0x4100) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x2, &(0x7f0000000200)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f00000003c0)='GPL\x00', 0x4, 0xe6, &(0x7f0000000400)=""/230, 0x40f00, 0x24, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000880)=[r0, r1, r0, r0, r1, r0, r1, r0, r1, r0], &(0x7f00000008c0)=[{0x2, 0x4, 0x1, 0x1}, {0x1, 0x3, 0x0, 0x1}, {0x3, 0x4, 0x5, 0xb}, {0x1, 0x1, 0xa, 0x7}, {0x3, 0x5, 0x4, 0xa}], 0x10, 0x6}, 0x90) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f0000000180)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[{}, {}, {}], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0], 0x3, 0x1, 0x4}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a00)={0x1b, 0x0, 0x0, 0xfffff8f3, 0x0, 0x1, 0x7, '\x00', r3, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{}, &(0x7f0000000a80), &(0x7f0000000ac0)=r4}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001dc0)={&(0x7f0000001c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@restrict={0x1, 0x0, 0x0, 0xb, 0x5}, @volatile={0xf}, @const={0x9, 0x0, 0x0, 0xa, 0x3}, @fwd={0x9}]}, {0x0, [0x30, 0x30, 0x5f, 0x2e, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000001d00)=""/176, 0x52, 0xb0, 0x1, 0x3}, 0x20) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001ec0)=@bpf_tracing={0x1a, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc1b, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @map_fd={0x18, 0x3, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000c40)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000c80)=""/4096, 0x0, 0x14, '\x00', r3, 0x1c, r8, 0x8, &(0x7f0000001e00)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000001e40)={0x1, 0x9, 0x3}, 0x10, 0x2b202, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000001e80)=[{0x2, 0x2, 0x10, 0x5}, {0x2, 0x4, 0xa, 0x8}], 0x10, 0x8}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) 02:37:49 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) renameat2(r0, &(0x7f0000000080)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x2) 02:37:49 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async, rerun: 32) renameat2(r0, &(0x7f0000000080)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x2) (rerun: 32) 02:37:49 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = syz_open_dev$dri(&(0x7f0000000000), 0xa4e, 0x4100) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x2, &(0x7f0000000200)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f00000003c0)='GPL\x00', 0x4, 0xe6, &(0x7f0000000400)=""/230, 0x40f00, 0x24, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000880)=[r0, r1, r0, r0, r1, r0, r1, r0, r1, r0], &(0x7f00000008c0)=[{0x2, 0x4, 0x1, 0x1}, {0x1, 0x3, 0x0, 0x1}, {0x3, 0x4, 0x5, 0xb}, {0x1, 0x1, 0xa, 0x7}, {0x3, 0x5, 0x4, 0xa}], 0x10, 0x6}, 0x90) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f0000000180)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[{}, {}, {}], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0], 0x3, 0x1, 0x4}) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f0000000180)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[{}, {}, {}], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0], 0x3, 0x1, 0x4}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a00)={0x1b, 0x0, 0x0, 0xfffff8f3, 0x0, 0x1, 0x7, '\x00', r3, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) (async) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a00)={0x1b, 0x0, 0x0, 0xfffff8f3, 0x0, 0x1, 0x7, '\x00', r3, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{}, &(0x7f0000000a80), &(0x7f0000000ac0)=r4}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000a80), &(0x7f0000000ac0)=r4}, 0x20) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001dc0)={&(0x7f0000001c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@restrict={0x1, 0x0, 0x0, 0xb, 0x5}, @volatile={0xf}, @const={0x9, 0x0, 0x0, 0xa, 0x3}, @fwd={0x9}]}, {0x0, [0x30, 0x30, 0x5f, 0x2e, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000001d00)=""/176, 0x52, 0xb0, 0x1, 0x3}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001ec0)=@bpf_tracing={0x1a, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc1b, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @map_fd={0x18, 0x3, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000c40)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000c80)=""/4096, 0x0, 0x14, '\x00', r3, 0x1c, r8, 0x8, &(0x7f0000001e00)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000001e40)={0x1, 0x9, 0x3}, 0x10, 0x2b202, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000001e80)=[{0x2, 0x2, 0x10, 0x5}, {0x2, 0x4, 0xa, 0x8}], 0x10, 0x8}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:37:49 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000040)={@id={0x2, 0x0, @d}}) 02:37:50 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000040)={@id={0x2, 0x0, @d}}) 02:37:50 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000040)={@id={0x2, 0x0, @d}}) 02:37:50 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0x7}}, 0x10) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000180)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f00000001c0)={"665c258680bb6bf894d637e679e6d473", 0x0, 0x0, {0x9, 0x9}, {0x7ff, 0x4}, 0x8, [0x2, 0x2, 0x7fffffff, 0x7, 0x7, 0x7fffffffffffffff, 0x80, 0x3, 0x1, 0x401, 0x780b, 0xfff, 0x5dd0000, 0x0, 0x7, 0x5]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000002c0)={"7c5978bf284897cedf0bd64f803292e2", r3, r4, {0x12}, {0x3ff, 0x2}, 0x9, [0xce4f, 0x1, 0x1000, 0x9, 0x5, 0x0, 0x10000, 0x4, 0x9, 0x5, 0x86e9, 0x4000002a8d21d9, 0x8, 0x7, 0x7, 0x7a3b]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000100)='./file0\x00', 0x1, 0x4000, r0}, 0x18) 02:37:50 executing program 1: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x10001, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000400), &(0x7f0000000500), 0x3, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x81, '\x00', r1, 0xffffffffffffffff, 0x10000000, 0x5, 0x1bfffd}, 0x34) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000580)=r4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x1f, &(0x7f0000000880)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @generic={0x0, 0x0, 0x9, 0x6, 0x9}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3708569b}}, @generic={0x40, 0xc, 0x3, 0x3, 0xfffffffa}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}], &(0x7f0000000600)='GPL\x00', 0x8000, 0xea, &(0x7f0000000980)=""/234, 0x41100, 0x20, '\x00', r1, 0x0, r4, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x0, 0x8, 0x400}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000ac0)=[{0x0, 0x1, 0xf, 0x12}, {0x3, 0x1, 0xe, 0x1}, {0x5, 0x1, 0x8, 0x5}], 0x10, 0x81}, 0x90) r6 = openat$dlm_plock(0xffffff9c, &(0x7f0000000bc0), 0x90000, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_ext={0x1c, 0xd, &(0x7f0000000c00)=@raw=[@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x81d}, @generic={0xa1, 0x1, 0xe, 0xf09, 0x36e}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, @generic={0x3, 0x1, 0x4, 0xfc00}, @ldst={0x2, 0x3, 0x3, 0x2, 0x9, 0x18, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @generic={0x3, 0x9, 0x4, 0x81, 0x3}], &(0x7f0000000c80)='GPL\x00', 0xfffffffa, 0x1, &(0x7f0000000cc0)=""/1, 0x40f00, 0x10, '\x00', r1, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000d00)={0x3, 0xc, 0x4, 0xffffffff}, 0x10, 0x16b41, r4, 0x5, 0x0, &(0x7f0000000d40)=[{0x4, 0x5, 0xa, 0x4}, {0x3, 0x1, 0x5, 0x1}, {0x5, 0x4, 0xb, 0x3}, {0x4, 0x1, 0xb, 0x1}, {0x3, 0x3, 0x101, 0x5}], 0x10, 0x8f11}, 0x90) ioctl$DRM_IOCTL_MODE_GETFB2(r4, 0xc06864ce, 0x0) execveat(r4, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='-/\x00', &(0x7f00000000c0)='(@-@\x00'], &(0x7f0000000300)=[&(0x7f0000000180)='\x00', &(0x7f00000001c0)=':\\\x00', &(0x7f0000000200)='\x00', &(0x7f00000002c0)='\x00'], 0x800) 02:37:50 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0x7}}, 0x10) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000180)=0x0) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f00000001c0)={"665c258680bb6bf894d637e679e6d473", 0x0, 0x0, {0x9, 0x9}, {0x7ff, 0x4}, 0x8, [0x2, 0x2, 0x7fffffff, 0x7, 0x7, 0x7fffffffffffffff, 0x80, 0x3, 0x1, 0x401, 0x780b, 0xfff, 0x5dd0000, 0x0, 0x7, 0x5]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000002c0)={"7c5978bf284897cedf0bd64f803292e2", r3, r4, {0x12}, {0x3ff, 0x2}, 0x9, [0xce4f, 0x1, 0x1000, 0x9, 0x5, 0x0, 0x10000, 0x4, 0x9, 0x5, 0x86e9, 0x4000002a8d21d9, 0x8, 0x7, 0x7, 0x7a3b]}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000100)='./file0\x00', 0x1, 0x4000, r0}, 0x18) 02:37:50 executing program 1: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x10001, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000400), &(0x7f0000000500), 0x3, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x81, '\x00', r1, 0xffffffffffffffff, 0x10000000, 0x5, 0x1bfffd}, 0x34) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000580)=r4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x1f, &(0x7f0000000880)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @generic={0x0, 0x0, 0x9, 0x6, 0x9}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3708569b}}, @generic={0x40, 0xc, 0x3, 0x3, 0xfffffffa}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}], &(0x7f0000000600)='GPL\x00', 0x8000, 0xea, &(0x7f0000000980)=""/234, 0x41100, 0x20, '\x00', r1, 0x0, r4, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x0, 0x8, 0x400}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000ac0)=[{0x0, 0x1, 0xf, 0x12}, {0x3, 0x1, 0xe, 0x1}, {0x5, 0x1, 0x8, 0x5}], 0x10, 0x81}, 0x90) (async) r6 = openat$dlm_plock(0xffffff9c, &(0x7f0000000bc0), 0x90000, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_ext={0x1c, 0xd, &(0x7f0000000c00)=@raw=[@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x81d}, @generic={0xa1, 0x1, 0xe, 0xf09, 0x36e}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, @generic={0x3, 0x1, 0x4, 0xfc00}, @ldst={0x2, 0x3, 0x3, 0x2, 0x9, 0x18, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @generic={0x3, 0x9, 0x4, 0x81, 0x3}], &(0x7f0000000c80)='GPL\x00', 0xfffffffa, 0x1, &(0x7f0000000cc0)=""/1, 0x40f00, 0x10, '\x00', r1, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000d00)={0x3, 0xc, 0x4, 0xffffffff}, 0x10, 0x16b41, r4, 0x5, 0x0, &(0x7f0000000d40)=[{0x4, 0x5, 0xa, 0x4}, {0x3, 0x1, 0x5, 0x1}, {0x5, 0x4, 0xb, 0x3}, {0x4, 0x1, 0xb, 0x1}, {0x3, 0x3, 0x101, 0x5}], 0x10, 0x8f11}, 0x90) (async) ioctl$DRM_IOCTL_MODE_GETFB2(r4, 0xc06864ce, 0x0) (async) execveat(r4, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='-/\x00', &(0x7f00000000c0)='(@-@\x00'], &(0x7f0000000300)=[&(0x7f0000000180)='\x00', &(0x7f00000001c0)=':\\\x00', &(0x7f0000000200)='\x00', &(0x7f00000002c0)='\x00'], 0x800) 02:37:51 executing program 1: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x10001, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000400), &(0x7f0000000500), 0x3, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x81, '\x00', r1, 0xffffffffffffffff, 0x10000000, 0x5, 0x1bfffd}, 0x34) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000580)=r4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x1f, &(0x7f0000000880)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @generic={0x0, 0x0, 0x9, 0x6, 0x9}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3708569b}}, @generic={0x40, 0xc, 0x3, 0x3, 0xfffffffa}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}], &(0x7f0000000600)='GPL\x00', 0x8000, 0xea, &(0x7f0000000980)=""/234, 0x41100, 0x20, '\x00', r1, 0x0, r4, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x0, 0x8, 0x400}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000ac0)=[{0x0, 0x1, 0xf, 0x12}, {0x3, 0x1, 0xe, 0x1}, {0x5, 0x1, 0x8, 0x5}], 0x10, 0x81}, 0x90) r6 = openat$dlm_plock(0xffffff9c, &(0x7f0000000bc0), 0x90000, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_ext={0x1c, 0xd, &(0x7f0000000c00)=@raw=[@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x81d}, @generic={0xa1, 0x1, 0xe, 0xf09, 0x36e}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, @generic={0x3, 0x1, 0x4, 0xfc00}, @ldst={0x2, 0x3, 0x3, 0x2, 0x9, 0x18, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @generic={0x3, 0x9, 0x4, 0x81, 0x3}], &(0x7f0000000c80)='GPL\x00', 0xfffffffa, 0x1, &(0x7f0000000cc0)=""/1, 0x40f00, 0x10, '\x00', r1, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000d00)={0x3, 0xc, 0x4, 0xffffffff}, 0x10, 0x16b41, r4, 0x5, 0x0, &(0x7f0000000d40)=[{0x4, 0x5, 0xa, 0x4}, {0x3, 0x1, 0x5, 0x1}, {0x5, 0x4, 0xb, 0x3}, {0x4, 0x1, 0xb, 0x1}, {0x3, 0x3, 0x101, 0x5}], 0x10, 0x8f11}, 0x90) (async) ioctl$DRM_IOCTL_MODE_GETFB2(r4, 0xc06864ce, 0x0) (async) execveat(r4, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='-/\x00', &(0x7f00000000c0)='(@-@\x00'], &(0x7f0000000300)=[&(0x7f0000000180)='\x00', &(0x7f00000001c0)=':\\\x00', &(0x7f0000000200)='\x00', &(0x7f00000002c0)='\x00'], 0x800) 02:37:51 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0x7}}, 0x10) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000180)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f00000001c0)={"665c258680bb6bf894d637e679e6d473", 0x0, 0x0, {0x9, 0x9}, {0x7ff, 0x4}, 0x8, [0x2, 0x2, 0x7fffffff, 0x7, 0x7, 0x7fffffffffffffff, 0x80, 0x3, 0x1, 0x401, 0x780b, 0xfff, 0x5dd0000, 0x0, 0x7, 0x5]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000002c0)={"7c5978bf284897cedf0bd64f803292e2", r3, r4, {0x12}, {0x3ff, 0x2}, 0x9, [0xce4f, 0x1, 0x1000, 0x9, 0x5, 0x0, 0x10000, 0x4, 0x9, 0x5, 0x86e9, 0x4000002a8d21d9, 0x8, 0x7, 0x7, 0x7a3b]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000100)='./file0\x00', 0x1, 0x4000, r0}, 0x18) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0x7}}, 0x10) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000180)) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f00000001c0)={"665c258680bb6bf894d637e679e6d473", 0x0, 0x0, {0x9, 0x9}, {0x7ff, 0x4}, 0x8, [0x2, 0x2, 0x7fffffff, 0x7, 0x7, 0x7fffffffffffffff, 0x80, 0x3, 0x1, 0x401, 0x780b, 0xfff, 0x5dd0000, 0x0, 0x7, 0x5]}) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000002c0)={"7c5978bf284897cedf0bd64f803292e2", r3, r4, {0x12}, {0x3ff, 0x2}, 0x9, [0xce4f, 0x1, 0x1000, 0x9, 0x5, 0x0, 0x10000, 0x4, 0x9, 0x5, 0x86e9, 0x4000002a8d21d9, 0x8, 0x7, 0x7, 0x7a3b]}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000100)='./file0\x00', 0x1, 0x4000, r0}, 0x18) (async) 02:37:51 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 02:37:51 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x632602, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={@desc={0x1, 0x0, @desc3}}) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:51 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) (async) 02:37:52 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x632602, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={@desc={0x1, 0x0, @desc3}}) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x632602, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={@desc={0x1, 0x0, @desc3}}) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:37:52 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 02:37:52 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x632602, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={@desc={0x1, 0x0, @desc3}}) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:52 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) 02:37:52 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x42500, 0x28) linkat(r0, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000000)='./file0\x00', 0x1400) 02:37:53 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) 02:37:53 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) r1 = openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x42500, 0x28) linkat(r0, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000000)='./file0\x00', 0x1400) 02:37:53 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) 02:37:53 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) r1 = openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x42500, 0x28) linkat(r0, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000000)='./file0\x00', 0x1400) 02:37:53 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000100)={r1, 0x1}) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x0) r2 = syz_open_dev$dri(&(0x7f0000000140), 0xfffffbff, 0x200000) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000180)={r1, 0x1}) 02:37:53 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xe7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r0}, 0x4) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f00000002c0)="a9942354c44b1ddacb7a51d5a266a1a1cd9310061b7dd8cfd79e5237d578000dac1df39d7720986aba2dfb27a682e639cf96af6f03bb0fcf5b291c4c72058c5ef57aa41b159e3fce385d7c58952368a9f01276627146abd4996469e28f58b5043c727a8361dfe99b21a9bc74eddff4f636985e6785b136a81e6d81027bd6ef6cb37c03a1bddd7f04220c261b8ddc1b948eec904350ddc359b5aeb29430c02856cc018b95", 0x0, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000140)='./file0\x00', r2}, 0x18) 02:37:54 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000100)={r1, 0x1}) (async) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x0) r2 = syz_open_dev$dri(&(0x7f0000000140), 0xfffffbff, 0x200000) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000180)={r1, 0x1}) 02:37:54 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xe7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r0}, 0x4) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f00000002c0)="a9942354c44b1ddacb7a51d5a266a1a1cd9310061b7dd8cfd79e5237d578000dac1df39d7720986aba2dfb27a682e639cf96af6f03bb0fcf5b291c4c72058c5ef57aa41b159e3fce385d7c58952368a9f01276627146abd4996469e28f58b5043c727a8361dfe99b21a9bc74eddff4f636985e6785b136a81e6d81027bd6ef6cb37c03a1bddd7f04220c261b8ddc1b948eec904350ddc359b5aeb29430c02856cc018b95", 0x0, 0x4}, 0x20) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000140)='./file0\x00', r2}, 0x18) 02:37:54 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000100)={r1, 0x1}) (async) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x0) (async) r2 = syz_open_dev$dri(&(0x7f0000000140), 0xfffffbff, 0x200000) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000180)={r1, 0x1}) 02:37:54 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xe7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r0}, 0x4) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f00000002c0)="a9942354c44b1ddacb7a51d5a266a1a1cd9310061b7dd8cfd79e5237d578000dac1df39d7720986aba2dfb27a682e639cf96af6f03bb0fcf5b291c4c72058c5ef57aa41b159e3fce385d7c58952368a9f01276627146abd4996469e28f58b5043c727a8361dfe99b21a9bc74eddff4f636985e6785b136a81e6d81027bd6ef6cb37c03a1bddd7f04220c261b8ddc1b948eec904350ddc359b5aeb29430c02856cc018b95", 0x0, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000140)='./file0\x00', r2}, 0x18) 02:37:54 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@private1}, &(0x7f0000000100)=0x14) linkat(r0, &(0x7f0000000000)='\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:55 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@private1}, &(0x7f0000000100)=0x14) (async) linkat(r0, &(0x7f0000000000)='\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:55 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@private1}, &(0x7f0000000100)=0x14) (async) linkat(r0, &(0x7f0000000000)='\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) 02:37:55 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x18e, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r1, 0x2}}, 0x18) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 02:37:55 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x7fffffff, 0x18000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0], 0x2}) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f0000000400)={0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000440)={r1, r2, 0x0, 0x15, 0x6, 0x6c368e8b, 0x2f8, 0x0, 0xfffff800, 0x80000000, 0xc025, 0x5}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8a, 0x8a, 0x4, [@datasec={0xf, 0x2, 0x0, 0xf, 0x2, [{0x3, 0x7ff, 0x7f}, {0x4, 0x9, 0x3e}], "088f"}, @const={0xe, 0x0, 0x0, 0xa, 0x1}, @enum={0xc, 0x2, 0x0, 0x6, 0x4, [{0xb, 0x401}, {0xe, 0x10001}]}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x9, [{0xb, 0x2, 0x10000}]}, @enum={0x6, 0x3, 0x0, 0x6, 0x4, [{0x8, 0x7fff}, {0x10, 0x978}, {0x0, 0x4}]}]}, {0x0, [0x2e, 0x30]}}, &(0x7f00000002c0)=""/154, 0xa8, 0x9a}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x640a, 0x0, r3, 0x9, '\x00', 0x0, r5, 0x4, 0x2, 0x5}, 0x48) 02:37:55 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x18e, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r1, 0x2}}, 0x18) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 02:37:55 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x7fffffff, 0x18000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0], 0x2}) (async) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0], 0x2}) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f0000000400)={0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000440)={r1, r2, 0x0, 0x15, 0x6, 0x6c368e8b, 0x2f8, 0x0, 0xfffff800, 0x80000000, 0xc025, 0x5}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8a, 0x8a, 0x4, [@datasec={0xf, 0x2, 0x0, 0xf, 0x2, [{0x3, 0x7ff, 0x7f}, {0x4, 0x9, 0x3e}], "088f"}, @const={0xe, 0x0, 0x0, 0xa, 0x1}, @enum={0xc, 0x2, 0x0, 0x6, 0x4, [{0xb, 0x401}, {0xe, 0x10001}]}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x9, [{0xb, 0x2, 0x10000}]}, @enum={0x6, 0x3, 0x0, 0x6, 0x4, [{0x8, 0x7fff}, {0x10, 0x978}, {0x0, 0x4}]}]}, {0x0, [0x2e, 0x30]}}, &(0x7f00000002c0)=""/154, 0xa8, 0x9a}, 0x20) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8a, 0x8a, 0x4, [@datasec={0xf, 0x2, 0x0, 0xf, 0x2, [{0x3, 0x7ff, 0x7f}, {0x4, 0x9, 0x3e}], "088f"}, @const={0xe, 0x0, 0x0, 0xa, 0x1}, @enum={0xc, 0x2, 0x0, 0x6, 0x4, [{0xb, 0x401}, {0xe, 0x10001}]}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x9, [{0xb, 0x2, 0x10000}]}, @enum={0x6, 0x3, 0x0, 0x6, 0x4, [{0x8, 0x7fff}, {0x10, 0x978}, {0x0, 0x4}]}]}, {0x0, [0x2e, 0x30]}}, &(0x7f00000002c0)=""/154, 0xa8, 0x9a}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x640a, 0x0, r3, 0x9, '\x00', 0x0, r5, 0x4, 0x2, 0x5}, 0x48) 02:37:55 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x18e, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r1, 0x2}}, 0x18) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) 02:37:56 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={@desc={0x1, 0x0, @desc2}}) r1 = shmget$private(0x0, 0x4000, 0x200, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000140)=""/211) 02:37:56 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x7fffffff, 0x18000) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0], 0x2}) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f0000000400)={0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000440)={r1, r2, 0x0, 0x15, 0x6, 0x6c368e8b, 0x2f8, 0x0, 0xfffff800, 0x80000000, 0xc025, 0x5}) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8a, 0x8a, 0x4, [@datasec={0xf, 0x2, 0x0, 0xf, 0x2, [{0x3, 0x7ff, 0x7f}, {0x4, 0x9, 0x3e}], "088f"}, @const={0xe, 0x0, 0x0, 0xa, 0x1}, @enum={0xc, 0x2, 0x0, 0x6, 0x4, [{0xb, 0x401}, {0xe, 0x10001}]}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x9, [{0xb, 0x2, 0x10000}]}, @enum={0x6, 0x3, 0x0, 0x6, 0x4, [{0x8, 0x7fff}, {0x10, 0x978}, {0x0, 0x4}]}]}, {0x0, [0x2e, 0x30]}}, &(0x7f00000002c0)=""/154, 0xa8, 0x9a}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x640a, 0x0, r3, 0x9, '\x00', 0x0, r5, 0x4, 0x2, 0x5}, 0x48) 02:37:56 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={@desc={0x1, 0x0, @desc2}}) r1 = shmget$private(0x0, 0x4000, 0x200, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000140)=""/211) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={@desc={0x1, 0x0, @desc2}}) (async) shmget$private(0x0, 0x4000, 0x200, &(0x7f0000ff9000/0x4000)=nil) (async) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000140)=""/211) (async) 02:37:56 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='.\x00', r0}, 0x18) 02:37:56 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={@desc={0x1, 0x0, @desc2}}) r1 = shmget$private(0x0, 0x4000, 0x200, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000140)=""/211) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={@desc={0x1, 0x0, @desc2}}) (async) shmget$private(0x0, 0x4000, 0x200, &(0x7f0000ff9000/0x4000)=nil) (async) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000140)=""/211) (async) 02:37:56 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='.\x00', r0}, 0x18) 02:37:57 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='.\x00', r0}, 0x18) 02:37:57 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000100)) r1 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', r0, 0x4000, r1}, 0x18) 02:37:57 executing program 1: socket$l2tp(0x2, 0x2, 0x73) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) openat$tcp_congestion(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) 02:37:57 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async, rerun: 64) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000100)) (async, rerun: 32) r1 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', r0, 0x4000, r1}, 0x18) 02:37:57 executing program 1: socket$l2tp(0x2, 0x2, 0x73) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) openat$tcp_congestion(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) 02:37:58 executing program 1: socket$l2tp(0x2, 0x2, 0x73) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) openat$tcp_congestion(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) 02:37:58 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x22a800, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) syz_open_dev$rtc(&(0x7f0000000200), 0xffffff7f, 0x2000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x40, r1, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) r4 = memfd_create(&(0x7f00000002c0)='(.\x00', 0x1) r5 = memfd_create(&(0x7f0000000300)='%%{\x00', 0x5) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x1, 0x6, [{r0, 0x0, 0x8000, 0x100000000}, {r4, 0x0, 0x1000, 0x1000000000000}, {r4, 0x0, 0x2000, 0x8000}, {r0, 0x0, 0x10000, 0x4000}, {r0, 0x0, 0x100000000, 0x1000000000000}, {r5, 0x0, 0xfffffffffffff000, 0xfffffffff0000000}]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:37:58 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x22a800, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) syz_open_dev$rtc(&(0x7f0000000200), 0xffffff7f, 0x2000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x40, r1, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) r4 = memfd_create(&(0x7f00000002c0)='(.\x00', 0x1) r5 = memfd_create(&(0x7f0000000300)='%%{\x00', 0x5) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x1, 0x6, [{r0, 0x0, 0x8000, 0x100000000}, {r4, 0x0, 0x1000, 0x1000000000000}, {r4, 0x0, 0x2000, 0x8000}, {r0, 0x0, 0x10000, 0x4000}, {r0, 0x0, 0x100000000, 0x1000000000000}, {r5, 0x0, 0xfffffffffffff000, 0xfffffffff0000000}]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x22a800, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) (async) syz_open_dev$rtc(&(0x7f0000000200), 0xffffff7f, 0x2000) (async) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x40, r1, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2}, 0x4) (async) memfd_create(&(0x7f00000002c0)='(.\x00', 0x1) (async) memfd_create(&(0x7f0000000300)='%%{\x00', 0x5) (async) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x1, 0x6, [{r0, 0x0, 0x8000, 0x100000000}, {r4, 0x0, 0x1000, 0x1000000000000}, {r4, 0x0, 0x2000, 0x8000}, {r0, 0x0, 0x10000, 0x4000}, {r0, 0x0, 0x100000000, 0x1000000000000}, {r5, 0x0, 0xfffffffffffff000, 0xfffffffff0000000}]}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) (async) 02:37:59 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x22a800, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) (async) syz_open_dev$rtc(&(0x7f0000000200), 0xffffff7f, 0x2000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x40, r1, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) (async) r4 = memfd_create(&(0x7f00000002c0)='(.\x00', 0x1) r5 = memfd_create(&(0x7f0000000300)='%%{\x00', 0x5) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000340)={0x1, 0x6, [{r0, 0x0, 0x8000, 0x100000000}, {r4, 0x0, 0x1000, 0x1000000000000}, {r4, 0x0, 0x2000, 0x8000}, {r0, 0x0, 0x10000, 0x4000}, {r0, 0x0, 0x100000000, 0x1000000000000}, {r5, 0x0, 0xfffffffffffff000, 0xfffffffff0000000}]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:37:59 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, 0x0) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r3, 0x40085203, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x17, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xc00}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xd2, &(0x7f00000002c0)=""/210, 0x41100, 0x10, '\x00', 0x0, 0x30, r3, 0x8, &(0x7f0000000100)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x9, 0x1, 0x100}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0)=[{0x0, 0x4, 0x4, 0x4}, {0x1, 0x1, 0x6, 0xb}, {0x4, 0x5, 0xc}, {0x2, 0x4, 0x10}, {0x4, 0x3, 0xb}, {0x1, 0x5, 0x2, 0xc}], 0x10, 0x4}, 0x90) 02:37:59 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, 0x0) (async) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r3, 0x40085203, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x17, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xc00}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xd2, &(0x7f00000002c0)=""/210, 0x41100, 0x10, '\x00', 0x0, 0x30, r3, 0x8, &(0x7f0000000100)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x9, 0x1, 0x100}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0)=[{0x0, 0x4, 0x4, 0x4}, {0x1, 0x1, 0x6, 0xb}, {0x4, 0x5, 0xc}, {0x2, 0x4, 0x10}, {0x4, 0x3, 0xb}, {0x1, 0x5, 0x2, 0xc}], 0x10, 0x4}, 0x90) 02:38:00 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, 0x0) (async) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r3, 0x40085203, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x17, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xc00}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xd2, &(0x7f00000002c0)=""/210, 0x41100, 0x10, '\x00', 0x0, 0x30, r3, 0x8, &(0x7f0000000100)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x9, 0x1, 0x100}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0)=[{0x0, 0x4, 0x4, 0x4}, {0x1, 0x1, 0x6, 0xb}, {0x4, 0x5, 0xc}, {0x2, 0x4, 0x10}, {0x4, 0x3, 0xb}, {0x1, 0x5, 0x2, 0xc}], 0x10, 0x4}, 0x90) 02:38:00 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180)="aa21f5733fbff98fbef4aa810e61385a95cedb336f898a89364e25b49d67c7f1c6cf1ab9faea3ffc703bcb618848515ea1e26b47547cdd16ce1215c1ce94df10cab67fde6a2d4c5a83cec4df2c8439208cfbc839e0f85d3b8131d6b7cdb18ae76939c6303f3ba6a0af83e11790d8e39176f8b022e341ab80d25eda2b273ac83cd1c923607b83a23f38e96ba7262fa8dbe8a034505548f803d9724148fba9188203fbb97878c735d1f885b76d5bab22203a813d8b71a96bcc3b8e750cf4ff8316", &(0x7f0000000880)=""/4096}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:00 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180)="aa21f5733fbff98fbef4aa810e61385a95cedb336f898a89364e25b49d67c7f1c6cf1ab9faea3ffc703bcb618848515ea1e26b47547cdd16ce1215c1ce94df10cab67fde6a2d4c5a83cec4df2c8439208cfbc839e0f85d3b8131d6b7cdb18ae76939c6303f3ba6a0af83e11790d8e39176f8b022e341ab80d25eda2b273ac83cd1c923607b83a23f38e96ba7262fa8dbe8a034505548f803d9724148fba9188203fbb97878c735d1f885b76d5bab22203a813d8b71a96bcc3b8e750cf4ff8316", &(0x7f0000000880)=""/4096}, 0x20) (async, rerun: 32) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:00 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180)="aa21f5733fbff98fbef4aa810e61385a95cedb336f898a89364e25b49d67c7f1c6cf1ab9faea3ffc703bcb618848515ea1e26b47547cdd16ce1215c1ce94df10cab67fde6a2d4c5a83cec4df2c8439208cfbc839e0f85d3b8131d6b7cdb18ae76939c6303f3ba6a0af83e11790d8e39176f8b022e341ab80d25eda2b273ac83cd1c923607b83a23f38e96ba7262fa8dbe8a034505548f803d9724148fba9188203fbb97878c735d1f885b76d5bab22203a813d8b71a96bcc3b8e750cf4ff8316", &(0x7f0000000880)=""/4096}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:00 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000900)={&(0x7f00000005c0)="ceae3828b95adade8ca57ba70db47e08840af314b2db860c0f0a466d4afdf4c829753c48c42ff216e9a68b7e4994fce12c5b28c3758c20f16fbb6fef187f8e62d1bad5963b362d18a2c0f212cd96ce3daa1bfe0c8f4055a7f9b3328f35b1a9c655df67a4eca66b3934ca8db82ee29aac56132d15176289aa40c57e3040cf7c73f082b148500ab852c1b1895c43d2fac6325b6a40970886a9a86c0e92f66ee26333837d3d7b31ff3132d247d529c201adac6805ef78fea1154e7f1b75d0", &(0x7f0000000680)=""/198, &(0x7f0000000780)="f66733983076e79c8189aaffe077c752fbd2279769c0fa815e6a6c697590e2abd3f9fe5bada030d7f4ef8cf161f594e7670f1e9bf203d92e0d5d6206e6abcbef1f5e0ce9b4a376f828067acdb3dfb1efe3a98cb8b40ab4df43e4de7da168ff8e9653ebc5f2b3363aee49329e28197ebe354b9da1335ee44fa3004c90b659a4225e946d11d75fca6791105201cbed4264406377c4a32497bf7528be815f2a324f2e7fc6ab604fdf40e4b792e53fc5a40528da43", &(0x7f0000000880)="dc71609ab0bd3e804f0586f8bf46eef23202f247a783e7a0a654d583335a1ca978a3fdffed980950657548aae403107807f9c4a1ffba95c202c58ca5c164bee6777ab5e3fa68ebf3d588e8a78b87e9c411b78ea0c042cfc8e0f37f5e51e1ad417d542bd1", 0xffff7fff, r0}, 0x38) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x4, [@typedef={0xa, 0x0, 0x0, 0x8, 0x5}, @typedef={0x0, 0x0, 0x0, 0x8, 0x5}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x22, 0x0, 0x66, 0x2}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x31, 0x0, 0x79, 0x6}, @enum={0xd, 0x1, 0x0, 0x6, 0x4, [{0xb, 0xff}]}, @const={0x1}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000480)=""/120, 0x74, 0x78, 0x1, 0x4}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9f, '\x00', r1, r2, 0x4, 0x0, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:00 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) openat$nci(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000100)) r1 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', r0, 0x4000, r1}, 0x18) 02:38:00 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000900)={&(0x7f00000005c0)="ceae3828b95adade8ca57ba70db47e08840af314b2db860c0f0a466d4afdf4c829753c48c42ff216e9a68b7e4994fce12c5b28c3758c20f16fbb6fef187f8e62d1bad5963b362d18a2c0f212cd96ce3daa1bfe0c8f4055a7f9b3328f35b1a9c655df67a4eca66b3934ca8db82ee29aac56132d15176289aa40c57e3040cf7c73f082b148500ab852c1b1895c43d2fac6325b6a40970886a9a86c0e92f66ee26333837d3d7b31ff3132d247d529c201adac6805ef78fea1154e7f1b75d0", &(0x7f0000000680)=""/198, &(0x7f0000000780)="f66733983076e79c8189aaffe077c752fbd2279769c0fa815e6a6c697590e2abd3f9fe5bada030d7f4ef8cf161f594e7670f1e9bf203d92e0d5d6206e6abcbef1f5e0ce9b4a376f828067acdb3dfb1efe3a98cb8b40ab4df43e4de7da168ff8e9653ebc5f2b3363aee49329e28197ebe354b9da1335ee44fa3004c90b659a4225e946d11d75fca6791105201cbed4264406377c4a32497bf7528be815f2a324f2e7fc6ab604fdf40e4b792e53fc5a40528da43", &(0x7f0000000880)="dc71609ab0bd3e804f0586f8bf46eef23202f247a783e7a0a654d583335a1ca978a3fdffed980950657548aae403107807f9c4a1ffba95c202c58ca5c164bee6777ab5e3fa68ebf3d588e8a78b87e9c411b78ea0c042cfc8e0f37f5e51e1ad417d542bd1", 0xffff7fff, r0}, 0x38) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000900)={&(0x7f00000005c0)="ceae3828b95adade8ca57ba70db47e08840af314b2db860c0f0a466d4afdf4c829753c48c42ff216e9a68b7e4994fce12c5b28c3758c20f16fbb6fef187f8e62d1bad5963b362d18a2c0f212cd96ce3daa1bfe0c8f4055a7f9b3328f35b1a9c655df67a4eca66b3934ca8db82ee29aac56132d15176289aa40c57e3040cf7c73f082b148500ab852c1b1895c43d2fac6325b6a40970886a9a86c0e92f66ee26333837d3d7b31ff3132d247d529c201adac6805ef78fea1154e7f1b75d0", &(0x7f0000000680)=""/198, &(0x7f0000000780)="f66733983076e79c8189aaffe077c752fbd2279769c0fa815e6a6c697590e2abd3f9fe5bada030d7f4ef8cf161f594e7670f1e9bf203d92e0d5d6206e6abcbef1f5e0ce9b4a376f828067acdb3dfb1efe3a98cb8b40ab4df43e4de7da168ff8e9653ebc5f2b3363aee49329e28197ebe354b9da1335ee44fa3004c90b659a4225e946d11d75fca6791105201cbed4264406377c4a32497bf7528be815f2a324f2e7fc6ab604fdf40e4b792e53fc5a40528da43", &(0x7f0000000880)="dc71609ab0bd3e804f0586f8bf46eef23202f247a783e7a0a654d583335a1ca978a3fdffed980950657548aae403107807f9c4a1ffba95c202c58ca5c164bee6777ab5e3fa68ebf3d588e8a78b87e9c411b78ea0c042cfc8e0f37f5e51e1ad417d542bd1", 0xffff7fff, r0}, 0x38) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x4, [@typedef={0xa, 0x0, 0x0, 0x8, 0x5}, @typedef={0x0, 0x0, 0x0, 0x8, 0x5}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x22, 0x0, 0x66, 0x2}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x31, 0x0, 0x79, 0x6}, @enum={0xd, 0x1, 0x0, 0x6, 0x4, [{0xb, 0xff}]}, @const={0x1}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000480)=""/120, 0x74, 0x78, 0x1, 0x4}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9f, '\x00', r1, r2, 0x4, 0x0, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:01 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000900)={&(0x7f00000005c0)="ceae3828b95adade8ca57ba70db47e08840af314b2db860c0f0a466d4afdf4c829753c48c42ff216e9a68b7e4994fce12c5b28c3758c20f16fbb6fef187f8e62d1bad5963b362d18a2c0f212cd96ce3daa1bfe0c8f4055a7f9b3328f35b1a9c655df67a4eca66b3934ca8db82ee29aac56132d15176289aa40c57e3040cf7c73f082b148500ab852c1b1895c43d2fac6325b6a40970886a9a86c0e92f66ee26333837d3d7b31ff3132d247d529c201adac6805ef78fea1154e7f1b75d0", &(0x7f0000000680)=""/198, &(0x7f0000000780)="f66733983076e79c8189aaffe077c752fbd2279769c0fa815e6a6c697590e2abd3f9fe5bada030d7f4ef8cf161f594e7670f1e9bf203d92e0d5d6206e6abcbef1f5e0ce9b4a376f828067acdb3dfb1efe3a98cb8b40ab4df43e4de7da168ff8e9653ebc5f2b3363aee49329e28197ebe354b9da1335ee44fa3004c90b659a4225e946d11d75fca6791105201cbed4264406377c4a32497bf7528be815f2a324f2e7fc6ab604fdf40e4b792e53fc5a40528da43", &(0x7f0000000880)="dc71609ab0bd3e804f0586f8bf46eef23202f247a783e7a0a654d583335a1ca978a3fdffed980950657548aae403107807f9c4a1ffba95c202c58ca5c164bee6777ab5e3fa68ebf3d588e8a78b87e9c411b78ea0c042cfc8e0f37f5e51e1ad417d542bd1", 0xffff7fff, r0}, 0x38) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x4, [@typedef={0xa, 0x0, 0x0, 0x8, 0x5}, @typedef={0x0, 0x0, 0x0, 0x8, 0x5}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x22, 0x0, 0x66, 0x2}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x31, 0x0, 0x79, 0x6}, @enum={0xd, 0x1, 0x0, 0x6, 0x4, [{0xb, 0xff}]}, @const={0x1}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000480)=""/120, 0x74, 0x78, 0x1, 0x4}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9f, '\x00', r1, r2, 0x4, 0x0, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:01 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$random(0xffffff9c, &(0x7f0000000080), 0x1b5180, 0x0) 02:38:01 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:38:01 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async, rerun: 64) openat$random(0xffffff9c, &(0x7f0000000080), 0x1b5180, 0x0) (rerun: 64) 02:38:01 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async, rerun: 64) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) (rerun: 64) 02:38:01 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:38:01 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) openat$random(0xffffff9c, &(0x7f0000000080), 0x1b5180, 0x0) 02:38:02 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes128, 0x1, @desc1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000080)="5a487020c71c6ad2627fc367f8f7f7a33e6a66140fcf79256b1e9b3d565148a03fcd2aa7c7066a1d47020905d2ba6b964d8ae2ab5a0eb502ecca57cc5ab533ef5abbf59692e999a8137a1218b1b5aa62221a71d50955a2753d900cb14bfddc9b8b7193ce2b42244e720488ff8bfcc4ab972f764bc50f752aa7b13311fa99887330a9977ea6befe20ea9f4b3036c8ae4241f85e1d3333527929438916a3a35ecad997fdcb6839290ffdea5d4251fbc19dac28b4033c5f31af104950deb1e2f1db1229c6296fb253e348fbad5c1608fdc127885774d0de8962589de614f39630a5542b", &(0x7f0000000880)=""/4096, 0x4}, 0x20) r1 = fanotify_init(0x10, 0x1000) r2 = openat$dir(0xffffff9c, &(0x7f00000001c0)='./file0\x00', 0x22000, 0xc8) faccessat2(r2, &(0x7f00000002c0)='./file0\x00', 0x2, 0x100) fanotify_mark(r1, 0x20, 0x10, r2, &(0x7f0000000200)='./file0\x00') 02:38:02 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000002c0)={0x10, 0x34, 0xfa00, {&(0x7f0000000200)={0xffffffffffffffff}, 0x3, {0xa, 0x4e24, 0x401, @private2, 0x2d}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) 02:38:02 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000002c0)={0x10, 0x34, 0xfa00, {&(0x7f0000000200)={0xffffffffffffffff}, 0x3, {0xa, 0x4e24, 0x401, @private2, 0x2d}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000002c0)={0x10, 0x34, 0xfa00, {&(0x7f0000000200), 0x3, {0xa, 0x4e24, 0x401, @private2, 0x2d}}}, 0x38) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) (async) 02:38:02 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes128, 0x1, @desc1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000080)="5a487020c71c6ad2627fc367f8f7f7a33e6a66140fcf79256b1e9b3d565148a03fcd2aa7c7066a1d47020905d2ba6b964d8ae2ab5a0eb502ecca57cc5ab533ef5abbf59692e999a8137a1218b1b5aa62221a71d50955a2753d900cb14bfddc9b8b7193ce2b42244e720488ff8bfcc4ab972f764bc50f752aa7b13311fa99887330a9977ea6befe20ea9f4b3036c8ae4241f85e1d3333527929438916a3a35ecad997fdcb6839290ffdea5d4251fbc19dac28b4033c5f31af104950deb1e2f1db1229c6296fb253e348fbad5c1608fdc127885774d0de8962589de614f39630a5542b", &(0x7f0000000880)=""/4096, 0x4}, 0x20) r1 = fanotify_init(0x10, 0x1000) r2 = openat$dir(0xffffff9c, &(0x7f00000001c0)='./file0\x00', 0x22000, 0xc8) faccessat2(r2, &(0x7f00000002c0)='./file0\x00', 0x2, 0x100) fanotify_mark(r1, 0x20, 0x10, r2, &(0x7f0000000200)='./file0\x00') bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes128, 0x1, @desc1}) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000080)="5a487020c71c6ad2627fc367f8f7f7a33e6a66140fcf79256b1e9b3d565148a03fcd2aa7c7066a1d47020905d2ba6b964d8ae2ab5a0eb502ecca57cc5ab533ef5abbf59692e999a8137a1218b1b5aa62221a71d50955a2753d900cb14bfddc9b8b7193ce2b42244e720488ff8bfcc4ab972f764bc50f752aa7b13311fa99887330a9977ea6befe20ea9f4b3036c8ae4241f85e1d3333527929438916a3a35ecad997fdcb6839290ffdea5d4251fbc19dac28b4033c5f31af104950deb1e2f1db1229c6296fb253e348fbad5c1608fdc127885774d0de8962589de614f39630a5542b", &(0x7f0000000880)=""/4096, 0x4}, 0x20) (async) fanotify_init(0x10, 0x1000) (async) openat$dir(0xffffff9c, &(0x7f00000001c0)='./file0\x00', 0x22000, 0xc8) (async) faccessat2(r2, &(0x7f00000002c0)='./file0\x00', 0x2, 0x100) (async) fanotify_mark(r1, 0x20, 0x10, r2, &(0x7f0000000200)='./file0\x00') (async) 02:38:02 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000002c0)={0x10, 0x34, 0xfa00, {&(0x7f0000000200)={0xffffffffffffffff}, 0x3, {0xa, 0x4e24, 0x401, @private2, 0x2d}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0), r1}}, 0x18) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) 02:38:02 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async, rerun: 32) openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes128, 0x1, @desc1}) (async, rerun: 64) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000080)="5a487020c71c6ad2627fc367f8f7f7a33e6a66140fcf79256b1e9b3d565148a03fcd2aa7c7066a1d47020905d2ba6b964d8ae2ab5a0eb502ecca57cc5ab533ef5abbf59692e999a8137a1218b1b5aa62221a71d50955a2753d900cb14bfddc9b8b7193ce2b42244e720488ff8bfcc4ab972f764bc50f752aa7b13311fa99887330a9977ea6befe20ea9f4b3036c8ae4241f85e1d3333527929438916a3a35ecad997fdcb6839290ffdea5d4251fbc19dac28b4033c5f31af104950deb1e2f1db1229c6296fb253e348fbad5c1608fdc127885774d0de8962589de614f39630a5542b", &(0x7f0000000880)=""/4096, 0x4}, 0x20) (async) r1 = fanotify_init(0x10, 0x1000) r2 = openat$dir(0xffffff9c, &(0x7f00000001c0)='./file0\x00', 0x22000, 0xc8) faccessat2(r2, &(0x7f00000002c0)='./file0\x00', 0x2, 0x100) fanotify_mark(r1, 0x20, 0x10, r2, &(0x7f0000000200)='./file0\x00') 02:38:03 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) readlinkat(r0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=""/233, 0xe9) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f00000003c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x6, 0x7}) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:03 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) readlinkat(r0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=""/233, 0xe9) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f00000003c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x6, 0x7}) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) readlinkat(r0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=""/233, 0xe9) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f00000003c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x6, 0x7}) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:38:03 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) readlinkat(r0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=""/233, 0xe9) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f00000003c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x6, 0x7}) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:03 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) 02:38:03 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000440)={@mcast1, 0x0}, &(0x7f0000000480)=0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x68, &(0x7f0000000680)}}, 0x10) r5 = syz_open_dev$dri(&(0x7f0000000800), 0x800, 0x400200) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) getpeername$l2tp6(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3e, 0x2d, &(0x7f0000000940)=ANY=[@ANYBLOB="180000000900000014554a1d7eb75312fa879383ca0397e300000000fffffff718110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000085100000fbffffff18110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018530000040000000000000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xc4d, 0xa2, &(0x7f0000000180)=""/162, 0x41100, 0x1, '\x00', r3, 0x3, r0, 0x8, &(0x7f00000004c0)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x0, 0x10, 0x1}, 0x90) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r6, 0xc01064b5, &(0x7f0000000380)={&(0x7f0000000340)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r5, 0xc04064a0, &(0x7f0000000b40)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000ac0)=[0x0, 0x0], &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x4, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_GETPLANE(r5, 0xc02064b6, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_SETPLANE(r6, 0xc03064b7, &(0x7f0000000c00)={r7, r8, r9, 0x100, 0x9, 0x727b, 0x10001, 0x0, 0x7, 0xb5f, 0x8, 0x400}) r10 = openat$iommufd(0xffffff9c, &(0x7f00000002c0), 0x210080, 0x0) ioctl$IOMMU_DESTROY$device(r10, 0x3b80, &(0x7f0000000300)={0x8}) 02:38:04 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) 02:38:04 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000440)={@mcast1, 0x0}, &(0x7f0000000480)=0x14) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x68, &(0x7f0000000680)}}, 0x10) (async, rerun: 64) r5 = syz_open_dev$dri(&(0x7f0000000800), 0x800, 0x400200) (async) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) getpeername$l2tp6(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3e, 0x2d, &(0x7f0000000940)=ANY=[@ANYBLOB="180000000900000014554a1d7eb75312fa879383ca0397e300000000fffffff718110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000085100000fbffffff18110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018530000040000000000000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xc4d, 0xa2, &(0x7f0000000180)=""/162, 0x41100, 0x1, '\x00', r3, 0x3, r0, 0x8, &(0x7f00000004c0)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x0, 0x10, 0x1}, 0x90) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r6, 0xc01064b5, &(0x7f0000000380)={&(0x7f0000000340)=[0x0], 0x1}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r5, 0xc04064a0, &(0x7f0000000b40)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000ac0)=[0x0, 0x0], &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x4, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_GETPLANE(r5, 0xc02064b6, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_SETPLANE(r6, 0xc03064b7, &(0x7f0000000c00)={r7, r8, r9, 0x100, 0x9, 0x727b, 0x10001, 0x0, 0x7, 0xb5f, 0x8, 0x400}) (async) r10 = openat$iommufd(0xffffff9c, &(0x7f00000002c0), 0x210080, 0x0) ioctl$IOMMU_DESTROY$device(r10, 0x3b80, &(0x7f0000000300)={0x8}) 02:38:04 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000440)={@mcast1, 0x0}, &(0x7f0000000480)=0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x68, &(0x7f0000000680)}}, 0x10) r5 = syz_open_dev$dri(&(0x7f0000000800), 0x800, 0x400200) (async) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) getpeername$l2tp6(r6, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3e, 0x2d, &(0x7f0000000940)=ANY=[@ANYBLOB="180000000900000014554a1d7eb75312fa879383ca0397e300000000fffffff718110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000085100000fbffffff18110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018530000040000000000000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xc4d, 0xa2, &(0x7f0000000180)=""/162, 0x41100, 0x1, '\x00', r3, 0x3, r0, 0x8, &(0x7f00000004c0)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x0, 0x10, 0x1}, 0x90) (async) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r6, 0xc01064b5, &(0x7f0000000380)={&(0x7f0000000340)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r5, 0xc04064a0, &(0x7f0000000b40)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000ac0)=[0x0, 0x0], &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x4, 0x2, 0x4}) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_GETPLANE(r5, 0xc02064b6, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0]}) (rerun: 32) ioctl$DRM_IOCTL_MODE_SETPLANE(r6, 0xc03064b7, &(0x7f0000000c00)={r7, r8, r9, 0x100, 0x9, 0x727b, 0x10001, 0x0, 0x7, 0xb5f, 0x8, 0x400}) (async) r10 = openat$iommufd(0xffffff9c, &(0x7f00000002c0), 0x210080, 0x0) ioctl$IOMMU_DESTROY$device(r10, 0x3b80, &(0x7f0000000300)={0x8}) 02:38:04 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async, rerun: 32) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) (rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) 02:38:04 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f0000000080)={0xc}) 02:38:04 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0xf4, 0x4, 0x0, 0x2002, r0, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x0, 0x4}, 0x48) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000640)={&(0x7f0000000500)="4feeebf4bc70a1996681935f14f2bf17c9fe7c75d0816ee0efe4e7f601aeb5d438b62a52dc5069bbe287328307495e15e627cce0f7630af28de79ef293b665e2a3500dcb864a5f35a7f74120ced36843f45fbe8cadf16b17c73f309c7433", &(0x7f0000000580)=""/116, &(0x7f0000000600)="e9ddad27e0111012b58ea03085f32bd432a2ffa477c8d8453091", &(0x7f0000000880)="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", 0x2, r0}, 0x38) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x8, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffffff8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xaf, &(0x7f00000002c0)=""/175, 0x41100, 0x20, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x0, 0x4, 0x9, 0x51}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000200)=[r0, r0], &(0x7f0000000380)=[{0x5, 0x3, 0xb, 0x8}, {0x5, 0x1, 0x0, 0x8}, {0x0, 0x5, 0x0, 0x1}], 0x10, 0x9b9}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:04 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f0000000080)={0xc}) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f0000000080)={0xc}) (async) 02:38:04 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0xf4, 0x4, 0x0, 0x2002, r0, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x0, 0x4}, 0x48) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000640)={&(0x7f0000000500)="4feeebf4bc70a1996681935f14f2bf17c9fe7c75d0816ee0efe4e7f601aeb5d438b62a52dc5069bbe287328307495e15e627cce0f7630af28de79ef293b665e2a3500dcb864a5f35a7f74120ced36843f45fbe8cadf16b17c73f309c7433", &(0x7f0000000580)=""/116, &(0x7f0000000600)="e9ddad27e0111012b58ea03085f32bd432a2ffa477c8d8453091", &(0x7f0000000880)="7b8c7f42a2d48317ad644a7197217cee7e8a70aa5ca7f90c0aae8dae47ee567d46fa4c5b70bf27269a4f2493814f6aa87994495ed6b3df59aa9b25c1a5d6a99e6d4d743254282d1a9d3c68ccfe29f2160c6bef14182e4f7c6ed7be87fc0ac9d77da91331b9bb3310e5679f9fb5ff337096e411a168b6f194c1e53d652f437ee77572466fd1d84f219643cc583fdcc654653b94c29af05a3d029a6d7283c59410f51b39d504155666970086e286585700dbaca6b4ce3f266d35752170c519d37a4b3446b7e680e6290ff1712fddddd1c8a8b362b5afdca3787575c4409cd664901404ea643143c1bc30d0488159af91056afe41b9ab1de00e7a7a74a3f4d3be2222b733211d663fd096a87dc8a036230d8881b2eb258b80c418f2c76e58be3cfd943731ec80f256f9a3fc23631881fec1ac8e4e193df5b290ddd2c2bdd5fb58dd6e8895d2f08c870c677834d57ab875c38d2def4acad3c9b6bd39189d5b0d583ca33646cc2fff7b68a82c3d0a739694a7f8a4efadc252dcedba611743d420292a2f36ffc4243ac58fbf3e7338c2e0ed57428ca4b385a7652a4657cbdef5cac57d4a64326909984f3d0198e600a265be87c7b7b693664b542f99f9bc921fe96ff384abcc4ff26e9563989363bcaccff746cca8ef993834cb40b517b0ca523b2dbfb39d70d2564842240bd489b6ffb39f630d8ad46cd21133a6a327d2f6372ee7472fbdda912267ff6841fe81bd010abae5ee02ae972b10f4276f883c332e83d9741a5307fc4b5b32770539c19ad69bb29cbb20e4225798ba962940705635dcf6167bc7782bc665d6c4a0f087515d06804b0843ba38d1950450e5aca9c61c3fbbf04f0d70921f4deb761b07aaafbfd7fcd6c713e0a273280c861735da84f9c913daa145ff5f6de979773ddef499923fc8a2be7895d67804946f2ae5ff180f6b7e5ba4b6bff9dbb2c10366af23ca07e8e1d1e83a794b975914bd15c01fe30b6b3c3c30dbe96f4f995b399739987191535a06d8964d3506e4035749d6f993002ab66cb81318c072885561848270efa7189092fb485f0ac3b08645bf79470d7c94c4957f475fd9812878caa62a09584e8f2fc3f4d672a9d149d435de636e46d6d584061a35b99517123a0319e0b81910ff4b82277d08b6d8efd3a7edc9795d713b2bc7a0a68515661854eb6671c2ca06c6e26114bd802348a774503e14937c251b29a3023b64d79f10659af8627549fc3f4c437101f8951e9f110469e275036efcd4910ef8ff6195ca22af833a99f306f78bc069f05e3d551f795649009bca94ea1c372a544b8662ff11fce85fbb79d1842f0c89940189cda5697e3c7f4c7fd8602484082f07a84b13c1bce952cb93799f1335e01f88abc12c87159bae7c6c91ba7d8a3cd85b7270cb74c395bc0fbb74ee82f8f95dc69d67d7b39cb9506165ba6c95dbf62eb169a212ee88dda57aea723b1b8c4d35dac524d55811c462bc2941be83b46ec125651866ac6dc8421f1a15ce1b51ae09cff2c9e253f01bc9ab0a553dbffe2098505fff1a13df7c76807811119f39517412572799bff8133868f9f9ed0e121fee4ea38a4810b54ebfd29586df0017a6b1d290e89337d5233496a3ccd6b4679678fd43f15017173d2a7d4c9e209890b2f21b56f94f604cf0f391cfd0fc0d0788e11c25a32be31946d151f8d01536247ae48d1c1b674ff6a89126d7b88c747e19f92720d7b81c8486e72f0c56d537ec98e8d17ad1579ad8f2c3d6c45c8d7ab57ae07ff6953aa3c5f390470eac5a5c3c03d1aed377043b9fa895d51e27f24a26afb856a24f29db1a4bdc1a684d9b3e7e166f7949c2b7cf0348fd898556af774b6737a4295f7f0fef4a5cd44d7d9cc45b4abcf62c491bbef643c2d62045cb3ad465c7c9417b1f44d7728bb95223e5d0ba467fa2130f8560d358c484fd0dd5a61e80b14e9380a06465221d90b78828b002e8919820ec5f7dee19bd05a96a0be51a4d5f46e9a3229750b6db4ea7a31858dbe49f2fd632c4f804e1b788ee87cae838363708816f4d3bc6beb2bd9796b25d21c4090565cc177c212eda4d7614f9b83860dfbc2c2d810248591eda221705cfe680128f45bfe8bc8567fcea9d082b6645e498496745f3071d138cb6dcbbe84ee3a5d91dd5150e91ecc58f5adcf9c89186914e5711d3880023ff630ea6a256ffd3bbb0412448b8a71899985bf2c9722046ad1d18c45d8373b8551390022569e4576bf0e26656e795aa9ec7c96508fb260133a62f66f7bedf54b2527d4a0ec7c434312b6430192ebbfd27d3f173bfb9c1c6e8f8e94525fd0d3d79d2aef6382861f3545b777269d8b228c8df46d2760bdc1fc30ef6b08799cc463138d81b77865d94241d520fccf612b31a61e6a3e56216787434ff2ef146a4747b613099ff27033aad488f301b2f464eff26abb785a5c47c1013ac8fadddcdcae1006fd45615115eea3370a4c06556257df0c2a7f8cb6c665f7e558095d600fab0e44888bea0bb193800ef43b7a53ff711a55b86d9c8f0d6c5c2fec100f828d8be17882bf22fed0c6b1e6b7378227fa9b4253bc73217d518cde2d118dc643d2effc9a4b2c8005eb82f7f98e91bf75c657c2cd7ed8f9f1f5e37eae677a0f9ac893ae6d576c0643829d2e17aa66b335d87ea8871a53c58ee74ec88ceb45af54806da413c3f0ffd37d7366141abfcf401563b025804a6af74c92af985d7f279c8fc859c2dc46f3b6727dcb93a40cb458f100807591de7b25ac25bed5ecd2e11cd853ed4b40989b51c5df816470eb4511afd38ff5f3d6fa64583ebfbdc0fd07f94696b90dd34df36a7ac0ea83398ef2bcce688e6aad9e03c305fbe301d13c758b60d01cb9765bf51a750068e5588458edbe1b138d2d053a6d9f15041815e91f26cfdaace3cf23936eab5dfca27cbd87c1a57b20b8e9c24aa684dec284a99f47b6ad9c88f4753cd02fe562a5c27900199eaa42aea66addd2e45435079e6dddd23156ff2330893d6dd83c53855bffb8631e6711895c2ce3e51ebc9782af34d2f6b565cebf82e14fc3c2ba9252eac166d020de29f353405b13043e5f54e269e2e70ad566acb057d6e8a07dfb90d5fdbbe872366c34e0235c0963c9acd0b2032feab9a4263865167e4abe68ceec01e78fcea0ff459304873c24b7b0555e15c6c0cc18f94cfe7f69765d09a99de626e46e883a85d48b2635440bc566bba0459ba32bc71fd1f600221603dd1547c1140ea09d90bd16ee76f7cc7d6c91b8505bd46ceea035642e1d2d2f756e1863adf729d8ed7406c245586c297fdb3fbc88b5ad4a8a647fb5821dfe4b2360952815dcc0bfe4ba0e7c98a37401e39685dd580ddbd6701939b887373244e98477e433fbc9e831d1a26144db9e15cc6b348873617c0f4af09a488a1c0b4fe2b5e57e7e49e6b6fae150b8227c0612bd155f98bf647897baa300dab43e8fd0610e873648e3841968ad6298242b9941c8de93fca9f8500d46a105e4d99c5c29af8c00f7c47b28b655c3284cad42c8ebfd220d315bd74786d45f1e936956f5770f923b267968d59610e18ca9727ec9c47d999c593633961bfb17f2df97676d28fa7e33225f5442400c2cc7a04787de9d4bb002c42dbdf6ffbd75e4aa522f1f931e433c232cc137197e8e73c56a11e41783dd9cc8217ef421d2240acfc028a65f93faac1a4fc2449ff748cd0e202fbc021e296c7829e709463b558a2b360eff791c68a6eec2a08234c42e245d45b44c6cb278a98bfc59e4d90f01bc4f5513ff218477b9212ae01ef3d0f06bcaf163de55f66794a7f327d93e7da87dd9bc97a8d632a288056b3874922664f5bf712f1c52b4c5439ec4b6b1664abfac85c8bd58f719f5321958a9b0c32badc29f40f68031485c1383a6f94e1f7bcb91e7df8e828caeb7c4501c2d4e17a7a27901f6b9b2187b4df18018d35bcc90f6482969ca55a274fb952d2f23ef8e8e318437cfcac3768cb42b13e452743cf9a042f0055e06295ba47eeed6053db590acbb77aed95b345ade988a38e392033267db7234c39831112d7b82ff15dd8c5c580895e6056ca224faa64c6fdb756057171ac30e4235bfdf23612d8c3887a6d6e86c78a23ddb6cd5be10f73aa70d70e4f992526a62e3c1cacaec57731622c24d15d3f1a7b14d6f0cc42441e6c83a996850a5edd8ffbef1c68b8faa74c3d7cdf88c25167d20999c7cb88fd003470ef4ab601d8cf6b363f5e73ca9779a8e9ef337fd20e15166d325525e8da57ac4b8fbb3b5e64cab4c4662f72dda81cd8db048f0cc73b453d5914fa1fe5073c494b4f8cab87d3d40768a231702744a63acfcc479f38e7c54f30c1e8108e83f258f21362f94165dd41be462f29dabff9f0d18d9f021ece042ce4a035b68e5dac61d9c0204af4024de94506ad6860501f31e89a2e4cf114df0fe9815dabd76a1b69521c8945f279ffd532e5720582d0590b22b819d2eb7625aecef716fd1f78eeb8328451ccb82cea7b1d0e9a001d14dc871c08c0f58befc745e7a67af67931dc67747f4f657d5a42a5e10d159a8ee74143b6821d2355ed60d84f1cd2b2303b9918e0a031372a75b156c99b5f523974270958bd312dfbd53313310267e80b8a5d17f67ae04e44c76055098679d1b8fa88599c889ec2f80e7b089a23cda8bc5cda996bc3df17ea6205c0cbbc3e229f3bbbc3926eb6db067fe5c5cd94ee85a9139012503478416795739bdea2613b32230e8d6525cd3e2335744544d3ccf061142e8ed2c84959219cc7ec55ae8cb1fb901f8043543b48da146de90bcdbb8c8161de55edb1a993cf87b0846a10d016feaa5d5a613bffa1896e76ab0c9bb1b4b7c116814ef2521d02eccc051064b25eec0cd941938b8f1d843319802e62bc8489c1a315a8502e3dacaf3c01c9f9b951aea9223a3f3a45cfeedcba9870035dc0ff54e4f99abcf48fcf85d284334d0f08c509fe21924e0fb8ffb4998e0d97f64161ad1f98e0660ccb53227b61504eaf15ae83bbbf441a4b3d8e5f42742cf953bc16d6670c02320ea921d59e77f8b68c86a364a818164a4ba16852350f599288c620a06f2cb2dd25b7b3d6ea1c042b07b81d23bc7a0283b34a507dace0cd34c849158ad0591d21612ca3edea39ac7345a9997eec0a9362d5109467d921004fce71b838d96bd0cfffc21bae1bd68c3c3ee2d0279bad213451e27b94d6e14652215e9af003506dc434410667af35f23cc48b73b0b2e70eeef571ec0619b0a5451a40bb986eb202b4d6831fd21d5f86dcca1cd5a8f28bb0d69c1f518bbf268226a490bcca137557c8803749edb2ed7ee209e091586006b1b38edf05f533a07c4a4b2e81b3c131a6e41ac7e4e930b69da89813553d343ba0a05b98ba1b676308ca4429478aea303f937fc997d00423814294e1a3571a1e8f2055639682aeee94ca68bcc23c7c88b8478275171aa9ffaab8e5c13b47a9c7e9e40b208de7e91b1e6b1413437a3ab2f4e2d1f811b0d2b667470681449ee36ce2bbe3593b1ef6845d7a1c0205741858cd7279bf739927a5de3f726dac74fb6bd986ab06410074e86a7ac2e8f6613aebe19975b878ee30b584a88e5482a97e68753b0358777badf408bf2d26a0a23f84b05747160db3f26e5e31f616d0db18b1073dfcb1978dbc282c41684b7eb3fedf3d596a6ca7020f2936523da33b1a2575b057690aa6c099be892f96c0a1a7daaef803d090ccd2fa44052fa8373b5bf454bc35019ffafe695f185a2c21d4f953dc8bcfdd0747f71c305cc11cf3d36ac5296a84636ea652697427df03933687", 0x2, r0}, 0x38) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, 0x0, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x8, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffffff8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xaf, &(0x7f00000002c0)=""/175, 0x41100, 0x20, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x0, 0x4, 0x9, 0x51}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000200)=[r0, r0], &(0x7f0000000380)=[{0x5, 0x3, 0xb, 0x8}, {0x5, 0x1, 0x0, 0x8}, {0x0, 0x5, 0x0, 0x1}], 0x10, 0x9b9}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:05 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f0000000080)={0xc}) 02:38:05 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0xf4, 0x4, 0x0, 0x2002, r0, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x0, 0x4}, 0x48) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000640)={&(0x7f0000000500)="4feeebf4bc70a1996681935f14f2bf17c9fe7c75d0816ee0efe4e7f601aeb5d438b62a52dc5069bbe287328307495e15e627cce0f7630af28de79ef293b665e2a3500dcb864a5f35a7f74120ced36843f45fbe8cadf16b17c73f309c7433", &(0x7f0000000580)=""/116, &(0x7f0000000600)="e9ddad27e0111012b58ea03085f32bd432a2ffa477c8d8453091", &(0x7f0000000880)="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", 0x2, r0}, 0x38) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x8, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffffff8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xaf, &(0x7f00000002c0)=""/175, 0x41100, 0x20, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x0, 0x4, 0x9, 0x51}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000200)=[r0, r0], &(0x7f0000000380)=[{0x5, 0x3, 0xb, 0x8}, {0x5, 0x1, 0x0, 0x8}, {0x0, 0x5, 0x0, 0x1}], 0x10, 0x9b9}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:05 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x10000, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000100)={@local}) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:05 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:05 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x10000, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000100)={@local}) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x10000, 0x0) (async) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000100)={@local}) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:38:05 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:05 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x10000, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000100)={@local}) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:05 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:06 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x3400) 02:38:06 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x400, 0x0, r1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$tcp_congestion(r4, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0xf}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x6, 0x1000, &(0x7f0000000880)=""/4096, 0x0, 0x8, '\x00', r3, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x8, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f00000005c0)=[{0x1, 0x3, 0x0, 0xa}, {0x5, 0x2, 0xb, 0x7}, {0x3, 0x3, 0x0, 0x4}], 0x10, 0xbf0}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x18) 02:38:06 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x3400) 02:38:06 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x400, 0x0, r1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x48) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x400, 0x0, r1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$tcp_congestion(r4, 0x0, 0x0) (async) write$tcp_congestion(r4, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0xf}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x6, 0x1000, &(0x7f0000000880)=""/4096, 0x0, 0x8, '\x00', r3, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x8, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f00000005c0)=[{0x1, 0x3, 0x0, 0xa}, {0x5, 0x2, 0xb, 0x7}, {0x3, 0x3, 0x0, 0x4}], 0x10, 0xbf0}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x18) 02:38:06 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x3400) (async) linkat(r0, &(0x7f0000000080)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x3400) 02:38:06 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$damon_attrs(r0, &(0x7f0000000100)={{' ', 0x1}, {' ', 0x5}, {' ', 0x2}, {' ', 0xffffffffffffff4b}, {' ', 0xffffffffffffffff}}, 0x69) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:06 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x400, 0x0, r1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$tcp_congestion(r4, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0xf}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x6, 0x1000, &(0x7f0000000880)=""/4096, 0x0, 0x8, '\x00', r3, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x8, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f00000005c0)=[{0x1, 0x3, 0x0, 0xa}, {0x5, 0x2, 0xb, 0x7}, {0x3, 0x3, 0x0, 0x4}], 0x10, 0xbf0}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x400, 0x0, r1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) (async) openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) (async) write$tcp_congestion(r4, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0xf}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x6, 0x1000, &(0x7f0000000880)=""/4096, 0x0, 0x8, '\x00', r3, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x8, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f00000005c0)=[{0x1, 0x3, 0x0, 0xa}, {0x5, 0x2, 0xb, 0x7}, {0x3, 0x3, 0x0, 0x4}], 0x10, 0xbf0}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file0/file0\x00', r1}, 0x18) (async) 02:38:07 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$damon_attrs(r0, &(0x7f0000000100)={{' ', 0x1}, {' ', 0x5}, {' ', 0x2}, {' ', 0xffffffffffffff4b}, {' ', 0xffffffffffffffff}}, 0x69) (async) write$damon_attrs(r0, &(0x7f0000000100)={{' ', 0x1}, {' ', 0x5}, {' ', 0x2}, {' ', 0xffffffffffffff4b}, {' ', 0xffffffffffffffff}}, 0x69) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:07 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$damon_attrs(r0, &(0x7f0000000100)={{' ', 0x1}, {' ', 0x5}, {' ', 0x2}, {' ', 0xffffffffffffff4b}, {' ', 0xffffffffffffffff}}, 0x69) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:07 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000780), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r2, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000200)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x22, 0x8, &(0x7f0000000940)=ANY=[@ANYRESOCT=r3, @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000000000008500000086000000186900000e00000000000000020000005507cc2eb5fa9bcf76cb619ebb7da6dfdc4d2bbbc1248db8d624e53607425cdc9ea43e67559c3ad31bfb5325d796a0ecb186df5743d6e1b58c59e66909268572d7a926ac85fa81f50a1dff866196b2fdab1f132efbcfe557f44d91f16e0100eb90f9bccd9ee58d6cf95c"], &(0x7f0000000040)='GPL\x00', 0x7, 0x4, &(0x7f00000000c0)=""/4, 0x40f00, 0xa, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0x9, 0x200, 0x1}, 0x10, r4, 0xffffffffffffffff, 0x6, &(0x7f0000000540)=[r1, r0], &(0x7f0000000580)=[{0x0, 0x5, 0x4, 0xb}, {0x4, 0x3, 0x8, 0x9}, {0x4, 0x2, 0xe}, {0x3, 0x5, 0xf, 0x6}, {0x3, 0x1, 0xf}, {0x1, 0x3, 0xb, 0x8}], 0x10, 0x3ff}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) openat$nci(0xffffff9c, &(0x7f00000006c0), 0x2, 0x0) 02:38:07 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'w\x00'}, 0x8) 02:38:07 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000780), r2) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r2, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000200)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x22, 0x8, &(0x7f0000000940)=ANY=[@ANYRESOCT=r3, @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000000000008500000086000000186900000e00000000000000020000005507cc2eb5fa9bcf76cb619ebb7da6dfdc4d2bbbc1248db8d624e53607425cdc9ea43e67559c3ad31bfb5325d796a0ecb186df5743d6e1b58c59e66909268572d7a926ac85fa81f50a1dff866196b2fdab1f132efbcfe557f44d91f16e0100eb90f9bccd9ee58d6cf95c"], &(0x7f0000000040)='GPL\x00', 0x7, 0x4, &(0x7f00000000c0)=""/4, 0x40f00, 0xa, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0x9, 0x200, 0x1}, 0x10, r4, 0xffffffffffffffff, 0x6, &(0x7f0000000540)=[r1, r0], &(0x7f0000000580)=[{0x0, 0x5, 0x4, 0xb}, {0x4, 0x3, 0x8, 0x9}, {0x4, 0x2, 0xe}, {0x3, 0x5, 0xf, 0x6}, {0x3, 0x1, 0xf}, {0x1, 0x3, 0xb, 0x8}], 0x10, 0x3ff}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) openat$nci(0xffffff9c, &(0x7f00000006c0), 0x2, 0x0) 02:38:07 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'w\x00'}, 0x8) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'w\x00'}, 0x8) (async) 02:38:07 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'w\x00'}, 0x8) 02:38:08 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000780), r2) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r2, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000200)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x22, 0x8, &(0x7f0000000940)=ANY=[@ANYRESOCT=r3, @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000000000008500000086000000186900000e00000000000000020000005507cc2eb5fa9bcf76cb619ebb7da6dfdc4d2bbbc1248db8d624e53607425cdc9ea43e67559c3ad31bfb5325d796a0ecb186df5743d6e1b58c59e66909268572d7a926ac85fa81f50a1dff866196b2fdab1f132efbcfe557f44d91f16e0100eb90f9bccd9ee58d6cf95c"], &(0x7f0000000040)='GPL\x00', 0x7, 0x4, &(0x7f00000000c0)=""/4, 0x40f00, 0xa, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0x9, 0x200, 0x1}, 0x10, r4, 0xffffffffffffffff, 0x6, &(0x7f0000000540)=[r1, r0], &(0x7f0000000580)=[{0x0, 0x5, 0x4, 0xb}, {0x4, 0x3, 0x8, 0x9}, {0x4, 0x2, 0xe}, {0x3, 0x5, 0xf, 0x6}, {0x3, 0x1, 0xf}, {0x1, 0x3, 0xb, 0x8}], 0x10, 0x3ff}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) openat$nci(0xffffff9c, &(0x7f00000006c0), 0x2, 0x0) 02:38:08 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:08 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:38:08 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:09 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@private0, 0x0}, &(0x7f0000000040)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x7, [@const={0xe, 0x0, 0x0, 0xa, 0x1}, @union={0xd, 0x2, 0x0, 0x5, 0x1, 0x7f, [{0x5, 0x3, 0xd75}, {0x7, 0x3, 0x1}]}, @const={0xb, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x61, 0x61, 0x61, 0x61, 0x0]}}, &(0x7f0000000180)=""/86, 0x5b, 0x56, 0x1, 0x7ff}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0xffff, 0x4, 0xc48, r1, 0xe5, '\x00', r2, r3, 0x4, 0x5, 0x3, 0xc}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:09 executing program 0: r0 = openat$sndseq(0xffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000180)={0x2, 0x8, 0xb4f1, 0x5, 0x1f, 0x1000}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)={{0x80, 0x7}, 0x0, 0x7, 0x1d, {0x8}}) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r1) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r2, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bond\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dvmrp1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x44001}, 0x4010) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000003c0)) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:09 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@private0, 0x0}, &(0x7f0000000040)=0x14) (async) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x7, [@const={0xe, 0x0, 0x0, 0xa, 0x1}, @union={0xd, 0x2, 0x0, 0x5, 0x1, 0x7f, [{0x5, 0x3, 0xd75}, {0x7, 0x3, 0x1}]}, @const={0xb, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x61, 0x61, 0x61, 0x61, 0x0]}}, &(0x7f0000000180)=""/86, 0x5b, 0x56, 0x1, 0x7ff}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0xffff, 0x4, 0xc48, r1, 0xe5, '\x00', r2, r3, 0x4, 0x5, 0x3, 0xc}, 0x48) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:09 executing program 0: r0 = openat$sndseq(0xffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000180)={0x2, 0x8, 0xb4f1, 0x5, 0x1f, 0x1000}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)={{0x80, 0x7}, 0x0, 0x7, 0x1d, {0x8}}) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r1) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r2, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bond\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dvmrp1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x44001}, 0x4010) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000003c0)) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$sndseq(0xffffff9c, &(0x7f0000000080), 0x2) (async) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000180)={0x2, 0x8, 0xb4f1, 0x5, 0x1f, 0x1000}) (async) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)={{0x80, 0x7}, 0x0, 0x7, 0x1d, {0x8}}) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) syz_genetlink_get_family_id$smc(&(0x7f0000000240), r1) (async) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r2, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bond\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dvmrp1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x44001}, 0x4010) (async) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000003c0)) (async) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:38:09 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@private0, 0x0}, &(0x7f0000000040)=0x14) (async) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x7, [@const={0xe, 0x0, 0x0, 0xa, 0x1}, @union={0xd, 0x2, 0x0, 0x5, 0x1, 0x7f, [{0x5, 0x3, 0xd75}, {0x7, 0x3, 0x1}]}, @const={0xb, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x61, 0x61, 0x61, 0x61, 0x0]}}, &(0x7f0000000180)=""/86, 0x5b, 0x56, 0x1, 0x7ff}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0xffff, 0x4, 0xc48, r1, 0xe5, '\x00', r2, r3, 0x4, 0x5, 0x3, 0xc}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:09 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:09 executing program 0: r0 = openat$sndseq(0xffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000180)={0x2, 0x8, 0xb4f1, 0x5, 0x1f, 0x1000}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)={{0x80, 0x7}, 0x0, 0x7, 0x1d, {0x8}}) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r1) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r2, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bond\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dvmrp1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x44001}, 0x4010) (async) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000003c0)) linkat(r1, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:09 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x400000, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x2, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) 02:38:10 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$sndseq(0xffffff9c, &(0x7f0000000100), 0x200000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, 0x0) linkat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1000) 02:38:10 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) r1 = openat$sndseq(0xffffff9c, &(0x7f0000000100), 0x200000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, 0x0) (async) linkat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1000) 02:38:10 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x2, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:10 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_RMFB(r0, 0xc00464af, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0]}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000004c0)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, r1, 0xeeeeeeee}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f00000001c0)={r2, 0x1, 0x772, 0x1, &(0x7f0000000180)=[{0x9, 0x0, 0x6, 0x7}]}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000500)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) r3 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) 02:38:10 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$sndseq(0xffffff9c, &(0x7f0000000100), 0x200000) (async) r1 = openat$sndseq(0xffffff9c, &(0x7f0000000100), 0x200000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, 0x0) linkat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1000) 02:38:11 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@o_path={&(0x7f0000000080)='./file0\x00', r0, 0x4000, r0}, 0x18) socket$nl_rdma(0x10, 0x3, 0x14) 02:38:11 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async, rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@o_path={&(0x7f0000000080)='./file0\x00', r0, 0x4000, r0}, 0x18) (rerun: 32) socket$nl_rdma(0x10, 0x3, 0x14) 02:38:12 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@o_path={&(0x7f0000000080)='./file0\x00', r0, 0x4000, r0}, 0x18) socket$nl_rdma(0x10, 0x3, 0x14) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@o_path={&(0x7f0000000080)='./file0\x00', r0, 0x4000, r0}, 0x18) (async) socket$nl_rdma(0x10, 0x3, 0x14) (async) 02:38:12 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x2, 0x9}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000002c0)={&(0x7f0000000080)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, r1, 0xcccccccc}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:12 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x2, 0x9}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x2, 0x9}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000002c0)={&(0x7f0000000080)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, r1, 0xcccccccc}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:13 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_RMFB(r0, 0xc00464af, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0]}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000004c0)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, r1, 0xeeeeeeee}) (async) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f00000001c0)={r2, 0x1, 0x772, 0x1, &(0x7f0000000180)=[{0x9, 0x0, 0x6, 0x7}]}) (async) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000500)) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) (async) r3 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) 02:38:13 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x2, 0x9}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000002c0)={&(0x7f0000000080)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, r1, 0xcccccccc}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:13 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$cgroup_devices(r0, &(0x7f0000000000)={'b', ' *:* ', 'wm\x00'}, 0x9) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0xff) 02:38:13 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$cgroup_devices(r0, &(0x7f0000000000)={'b', ' *:* ', 'wm\x00'}, 0x9) (async, rerun: 32) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) (async, rerun: 32) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0xff) 02:38:14 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$cgroup_devices(r0, &(0x7f0000000000)={'b', ' *:* ', 'wm\x00'}, 0x9) (async) write$cgroup_devices(r0, &(0x7f0000000000)={'b', ' *:* ', 'wm\x00'}, 0x9) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0xff) 02:38:14 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28002404}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x69}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x400}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000041}, 0x40000) linkat(r0, &(0x7f0000000080)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) 02:38:15 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28002404}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x69}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x400}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000041}, 0x40000) linkat(r0, &(0x7f0000000080)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) 02:38:15 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28002404}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x69}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x400}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000041}, 0x40000) (async) linkat(r0, &(0x7f0000000080)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) 02:38:15 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_RMFB(r0, 0xc00464af, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0]}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000004c0)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, r1, 0xeeeeeeee}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f00000001c0)={r2, 0x1, 0x772, 0x1, &(0x7f0000000180)=[{0x9, 0x0, 0x6, 0x7}]}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000500)) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) r3 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) 02:38:16 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x1, 0x2, 0x6}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x6, 0x70, 0x3, 0x0, [0x0], [0x0, 0x1, 0x2, 0x1], [0x5, 0x1, 0x4, 0x8000], [0x3, 0xffff, 0x9, 0x8000]}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000280)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000002c0)={0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000300)={0x0, 0xf4, 0x5, 0x615, 0x2, [0x0, 0x0], [0x0, 0x1000, 0xa8, 0x2], [0x6, 0x3ff, 0x5], [0x0, 0x1d, 0x1, 0x1000]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000380)={r1, 0x2, 0xf1, 0x9, 0x3, [r2, r3, r4, r5], [0x401, 0x8f2b, 0x35f7af6b, 0x6], [0x3, 0x7f, 0x4, 0x2], [0x23, 0x7fffffff, 0x7fff, 0x1ff]}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)=@o_path={&(0x7f0000000080)='./file0\x00', r0, 0x4000, r0}, 0x18) 02:38:17 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x1, 0x2, 0x6}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x6, 0x70, 0x3, 0x0, [0x0], [0x0, 0x1, 0x2, 0x1], [0x5, 0x1, 0x4, 0x8000], [0x3, 0xffff, 0x9, 0x8000]}) (async) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000280)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000002c0)={0x0, 0x0}) (async) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000300)={0x0, 0xf4, 0x5, 0x615, 0x2, [0x0, 0x0], [0x0, 0x1000, 0xa8, 0x2], [0x6, 0x3ff, 0x5], [0x0, 0x1d, 0x1, 0x1000]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000380)={r1, 0x2, 0xf1, 0x9, 0x3, [r2, r3, r4, r5], [0x401, 0x8f2b, 0x35f7af6b, 0x6], [0x3, 0x7f, 0x4, 0x2], [0x23, 0x7fffffff, 0x7fff, 0x1ff]}) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)=@o_path={&(0x7f0000000080)='./file0\x00', r0, 0x4000, r0}, 0x18) 02:38:17 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x1, 0x2, 0x6}) (async) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x6, 0x70, 0x3, 0x0, [0x0], [0x0, 0x1, 0x2, 0x1], [0x5, 0x1, 0x4, 0x8000], [0x3, 0xffff, 0x9, 0x8000]}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000280)={0x0, 0x0}) (async) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000002c0)={0x0, 0x0}) (async) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000300)={0x0, 0xf4, 0x5, 0x615, 0x2, [0x0, 0x0], [0x0, 0x1000, 0xa8, 0x2], [0x6, 0x3ff, 0x5], [0x0, 0x1d, 0x1, 0x1000]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000380)={r1, 0x2, 0xf1, 0x9, 0x3, [r2, r3, r4, r5], [0x401, 0x8f2b, 0x35f7af6b, 0x6], [0x3, 0x7f, 0x4, 0x2], [0x23, 0x7fffffff, 0x7fff, 0x1ff]}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)=@o_path={&(0x7f0000000080)='./file0\x00', r0, 0x4000, r0}, 0x18) 02:38:18 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000100)="3e27187a68d9178dc090326abcc69caf8767934fb3e24b78f7ca5379ea8f427e41ed3dfbdf482b1ad3bf0f3eeb3a759722d77717c569817d12f0b9ab194120ff007f6c72306e6080f64e1b7bdd80e7d90e33842a29f4cbd7c43868eeb586b2", &(0x7f0000000080)=""/30}, 0x20) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:18 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000100)="3e27187a68d9178dc090326abcc69caf8767934fb3e24b78f7ca5379ea8f427e41ed3dfbdf482b1ad3bf0f3eeb3a759722d77717c569817d12f0b9ab194120ff007f6c72306e6080f64e1b7bdd80e7d90e33842a29f4cbd7c43868eeb586b2", &(0x7f0000000080)=""/30}, 0x20) (async, rerun: 32) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (rerun: 32) 02:38:18 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000100)="3e27187a68d9178dc090326abcc69caf8767934fb3e24b78f7ca5379ea8f427e41ed3dfbdf482b1ad3bf0f3eeb3a759722d77717c569817d12f0b9ab194120ff007f6c72306e6080f64e1b7bdd80e7d90e33842a29f4cbd7c43868eeb586b2", &(0x7f0000000080)=""/30}, 0x20) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000100)="3e27187a68d9178dc090326abcc69caf8767934fb3e24b78f7ca5379ea8f427e41ed3dfbdf482b1ad3bf0f3eeb3a759722d77717c569817d12f0b9ab194120ff007f6c72306e6080f64e1b7bdd80e7d90e33842a29f4cbd7c43868eeb586b2", &(0x7f0000000080)=""/30}, 0x20) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:38:19 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x22a2c0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000080)='./file0\x00', r0}, 0x18) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:19 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x22a2c0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000080)='./file0\x00', r0}, 0x18) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:19 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@ipv4={""/10, ""/2, @multicast2}, 0x0}, &(0x7f0000000040)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x1c00, 0x0, 0x1, 0x7ff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x5, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x8, [@const={0xe, 0x0, 0x0, 0xa, 0x2}, @var={0xe, 0x0, 0x0, 0xe, 0x5, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x1}}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x9}, {0x9, 0x5}, {0x5, 0x3}]}, @fwd={0xc}, @fwd={0xd}, @union={0x9, 0x2, 0x0, 0x5, 0x1, 0x8, [{0xb, 0x4, 0x7ff}, {0x5, 0x0, 0x188}]}, @const={0x3, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x0, 0x2e, 0x30, 0x61, 0x61, 0x61]}}, &(0x7f0000000880)=""/4096, 0xc0, 0x1000, 0x1, 0x9}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x1, '\x00', r2, r3, 0x1f, 0x3, 0x2}, 0x48) 02:38:19 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@ipv4={""/10, ""/2, @multicast2}, 0x0}, &(0x7f0000000040)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x1c00, 0x0, 0x1, 0x7ff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x5, 0x1}, 0x48) (async, rerun: 64) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (rerun: 64) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x8, [@const={0xe, 0x0, 0x0, 0xa, 0x2}, @var={0xe, 0x0, 0x0, 0xe, 0x5, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x1}}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x9}, {0x9, 0x5}, {0x5, 0x3}]}, @fwd={0xc}, @fwd={0xd}, @union={0x9, 0x2, 0x0, 0x5, 0x1, 0x8, [{0xb, 0x4, 0x7ff}, {0x5, 0x0, 0x188}]}, @const={0x3, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x0, 0x2e, 0x30, 0x61, 0x61, 0x61]}}, &(0x7f0000000880)=""/4096, 0xc0, 0x1000, 0x1, 0x9}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x1, '\x00', r2, r3, 0x1f, 0x3, 0x2}, 0x48) 02:38:19 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x22a2c0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000080)='./file0\x00', r0}, 0x18) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x22a2c0, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000080)='./file0\x00', r0}, 0x18) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:38:19 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@ipv4={""/10, ""/2, @multicast2}, 0x0}, &(0x7f0000000040)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x1c00, 0x0, 0x1, 0x7ff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x5, 0x1}, 0x48) (async, rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async, rerun: 32) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x8, [@const={0xe, 0x0, 0x0, 0xa, 0x2}, @var={0xe, 0x0, 0x0, 0xe, 0x5, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x1}}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x9}, {0x9, 0x5}, {0x5, 0x3}]}, @fwd={0xc}, @fwd={0xd}, @union={0x9, 0x2, 0x0, 0x5, 0x1, 0x8, [{0xb, 0x4, 0x7ff}, {0x5, 0x0, 0x188}]}, @const={0x3, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x0, 0x2e, 0x30, 0x61, 0x61, 0x61]}}, &(0x7f0000000880)=""/4096, 0xc0, 0x1000, 0x1, 0x9}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x1, '\x00', r2, r3, 0x1f, 0x3, 0x2}, 0x48) 02:38:19 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0xeea) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x5, [@struct={0x7, 0x9, 0x0, 0x4, 0x0, 0x4, [{0x9, 0x5, 0x8}, {0xe, 0x2, 0x101}, {0x6, 0x0, 0xff}, {0xc, 0x0, 0x100}, {0x2, 0x5, 0x2}, {0xc, 0x2, 0x8001}, {0xd, 0x2}, {0x4, 0x3, 0x5}, {0x10, 0x3, 0x6}]}, @restrict={0xf}, @const={0x2, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x61, 0xe, 0x5f]}}, &(0x7f00000001c0)=""/96, 0xad, 0x60, 0x0, 0x93a1}, 0x20) 02:38:20 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:20 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0xeea) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x5, [@struct={0x7, 0x9, 0x0, 0x4, 0x0, 0x4, [{0x9, 0x5, 0x8}, {0xe, 0x2, 0x101}, {0x6, 0x0, 0xff}, {0xc, 0x0, 0x100}, {0x2, 0x5, 0x2}, {0xc, 0x2, 0x8001}, {0xd, 0x2}, {0x4, 0x3, 0x5}, {0x10, 0x3, 0x6}]}, @restrict={0xf}, @const={0x2, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x61, 0xe, 0x5f]}}, &(0x7f00000001c0)=""/96, 0xad, 0x60, 0x0, 0x93a1}, 0x20) 02:38:20 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:20 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0xeea) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x5, [@struct={0x7, 0x9, 0x0, 0x4, 0x0, 0x4, [{0x9, 0x5, 0x8}, {0xe, 0x2, 0x101}, {0x6, 0x0, 0xff}, {0xc, 0x0, 0x100}, {0x2, 0x5, 0x2}, {0xc, 0x2, 0x8001}, {0xd, 0x2}, {0x4, 0x3, 0x5}, {0x10, 0x3, 0x6}]}, @restrict={0xf}, @const={0x2, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x61, 0xe, 0x5f]}}, &(0x7f00000001c0)=""/96, 0xad, 0x60, 0x0, 0x93a1}, 0x20) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0xeea) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x5, [@struct={0x7, 0x9, 0x0, 0x4, 0x0, 0x4, [{0x9, 0x5, 0x8}, {0xe, 0x2, 0x101}, {0x6, 0x0, 0xff}, {0xc, 0x0, 0x100}, {0x2, 0x5, 0x2}, {0xc, 0x2, 0x8001}, {0xd, 0x2}, {0x4, 0x3, 0x5}, {0x10, 0x3, 0x6}]}, @restrict={0xf}, @const={0x2, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x61, 0xe, 0x5f]}}, &(0x7f00000001c0)=""/96, 0xad, 0x60, 0x0, 0x93a1}, 0x20) (async) 02:38:20 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:21 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000100)={r1, 0x1}) linkat(r0, &(0x7f0000000080)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000140)={@id={0x2, 0x0, @a}}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8008}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r2, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x2404c800}, 0x4040000) 02:38:21 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@func={0x10, 0x0, 0x0, 0xc, 0x2}, @union={0xe, 0x1, 0x0, 0x5, 0x1, 0x80000000, [{0xf, 0x5, 0x5}]}, @var={0x800, 0x0, 0x0, 0xe, 0x3, 0x1}, @var={0x10, 0x0, 0x0, 0xe, 0x5}, @var={0xe, 0x0, 0x0, 0xe, 0x5}, @ptr={0x1, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000880)=""/4096, 0x7b, 0x1000, 0x0, 0x6876}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:21 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@func={0x10, 0x0, 0x0, 0xc, 0x2}, @union={0xe, 0x1, 0x0, 0x5, 0x1, 0x80000000, [{0xf, 0x5, 0x5}]}, @var={0x800, 0x0, 0x0, 0xe, 0x3, 0x1}, @var={0x10, 0x0, 0x0, 0xe, 0x5}, @var={0xe, 0x0, 0x0, 0xe, 0x5}, @ptr={0x1, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000880)=""/4096, 0x7b, 0x1000, 0x0, 0x6876}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@func={0x10, 0x0, 0x0, 0xc, 0x2}, @union={0xe, 0x1, 0x0, 0x5, 0x1, 0x80000000, [{0xf, 0x5, 0x5}]}, @var={0x800, 0x0, 0x0, 0xe, 0x3, 0x1}, @var={0x10, 0x0, 0x0, 0xe, 0x5}, @var={0xe, 0x0, 0x0, 0xe, 0x5}, @ptr={0x1, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000880)=""/4096, 0x7b, 0x1000, 0x0, 0x6876}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:21 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000100)={r1, 0x1}) (async) linkat(r0, &(0x7f0000000080)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800) (async, rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000140)={@id={0x2, 0x0, @a}}) (async, rerun: 32) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8008}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r2, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x2404c800}, 0x4040000) 02:38:21 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000100)={r1, 0x1}) linkat(r0, &(0x7f0000000080)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000140)={@id={0x2, 0x0, @a}}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8008}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r2, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x2404c800}, 0x4040000) 02:38:21 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@func={0x10, 0x0, 0x0, 0xc, 0x2}, @union={0xe, 0x1, 0x0, 0x5, 0x1, 0x80000000, [{0xf, 0x5, 0x5}]}, @var={0x800, 0x0, 0x0, 0xe, 0x3, 0x1}, @var={0x10, 0x0, 0x0, 0xe, 0x5}, @var={0xe, 0x0, 0x0, 0xe, 0x5}, @ptr={0x1, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000880)=""/4096, 0x7b, 0x1000, 0x0, 0x6876}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@func={0x10, 0x0, 0x0, 0xc, 0x2}, @union={0xe, 0x1, 0x0, 0x5, 0x1, 0x80000000, [{0xf, 0x5, 0x5}]}, @var={0x800, 0x0, 0x0, 0xe, 0x3, 0x1}, @var={0x10, 0x0, 0x0, 0xe, 0x5}, @var={0xe, 0x0, 0x0, 0xe, 0x5}, @ptr={0x1, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000880)=""/4096, 0x7b, 0x1000, 0x0, 0x6876}, 0x20) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) 02:38:22 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:22 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:22 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:22 executing program 0: add_key$user(&(0x7f00000000c0), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000140)="34a792482b39d0aa2619c2aa67d4df0ae78bb1bf37e7e875330405de82cfbd396a5ab0ecb72928d5ee973956ae0907052c3eb045b562f8fc7db09b6a83879fa48494e3bbaf1e2ae4d10d26f7e259c41be1b4c489dbee21265ad786b18ba866e971f4b504bfc231c93d3208bde62d1ea26d8101e3c702d64f62f45e048a92612560266f2abd401a0973c67f759447e9437f4ccd44cae8ceb45759d8ea6d94c7a9c03d72df9fe682ff6c298aebcf91a549e8c4d8c43596ee6404456950e6ff69454267abe0f13c6d0b40442a4b7e", 0xcd, 0xfffffffffffffffa) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x40000, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:22 executing program 0: add_key$user(&(0x7f00000000c0), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000140)="34a792482b39d0aa2619c2aa67d4df0ae78bb1bf37e7e875330405de82cfbd396a5ab0ecb72928d5ee973956ae0907052c3eb045b562f8fc7db09b6a83879fa48494e3bbaf1e2ae4d10d26f7e259c41be1b4c489dbee21265ad786b18ba866e971f4b504bfc231c93d3208bde62d1ea26d8101e3c702d64f62f45e048a92612560266f2abd401a0973c67f759447e9437f4ccd44cae8ceb45759d8ea6d94c7a9c03d72df9fe682ff6c298aebcf91a549e8c4d8c43596ee6404456950e6ff69454267abe0f13c6d0b40442a4b7e", 0xcd, 0xfffffffffffffffa) (async) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x40000, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:22 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x80000}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:23 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x80000}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x80000}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) 02:38:23 executing program 0: add_key$user(&(0x7f00000000c0), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000140)="34a792482b39d0aa2619c2aa67d4df0ae78bb1bf37e7e875330405de82cfbd396a5ab0ecb72928d5ee973956ae0907052c3eb045b562f8fc7db09b6a83879fa48494e3bbaf1e2ae4d10d26f7e259c41be1b4c489dbee21265ad786b18ba866e971f4b504bfc231c93d3208bde62d1ea26d8101e3c702d64f62f45e048a92612560266f2abd401a0973c67f759447e9437f4ccd44cae8ceb45759d8ea6d94c7a9c03d72df9fe682ff6c298aebcf91a549e8c4d8c43596ee6404456950e6ff69454267abe0f13c6d0b40442a4b7e", 0xcd, 0xfffffffffffffffa) r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x40000, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:23 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x80000}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:23 executing program 0: openat$iommufd(0xffffff9c, &(0x7f0000000080), 0x101002, 0x0) 02:38:23 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000180)={0x3, 0x4, 0x0, 'queue1\x00', 0x400}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x20c03, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000100), 0xc02, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4}) 02:38:23 executing program 0: openat$iommufd(0xffffff9c, &(0x7f0000000080), 0x101002, 0x0) 02:38:23 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000180)={0x3, 0x4, 0x0, 'queue1\x00', 0x400}) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x20c03, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000100), 0xc02, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4}) 02:38:24 executing program 0: openat$iommufd(0xffffff9c, &(0x7f0000000080), 0x101002, 0x0) openat$iommufd(0xffffff9c, &(0x7f0000000080), 0x101002, 0x0) (async) 02:38:24 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000180)={0x3, 0x4, 0x0, 'queue1\x00', 0x400}) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00'}, 0x18) (async) r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x20c03, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000100), 0xc02, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4}) 02:38:24 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:24 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:24 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x2) 02:38:24 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:24 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x2) 02:38:24 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) 02:38:24 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x2) 02:38:24 executing program 1: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x16200, 0x7d) mknodat$null(r0, &(0x7f0000000040)='./file0/file0\x00', 0x40, 0x103) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) readlinkat(r0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=""/124, 0x7c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:38:25 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) 02:38:25 executing program 1: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x16200, 0x7d) mknodat$null(r0, &(0x7f0000000040)='./file0/file0\x00', 0x40, 0x103) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) readlinkat(r0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=""/124, 0x7c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x16200, 0x7d) (async) mknodat$null(r0, &(0x7f0000000040)='./file0/file0\x00', 0x40, 0x103) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) readlinkat(r0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=""/124, 0x7c) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) (async) 02:38:25 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) 02:38:25 executing program 1: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x16200, 0x7d) mknodat$null(r0, &(0x7f0000000040)='./file0/file0\x00', 0x40, 0x103) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) readlinkat(r0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=""/124, 0x7c) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:38:25 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$dir(0xffffff9c, &(0x7f00000001c0)='./file0\x00', 0x42, 0xa) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:25 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$dir(0xffffff9c, &(0x7f00000001c0)='./file0\x00', 0x42, 0xa) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) openat$dir(0xffffff9c, &(0x7f00000001c0)='./file0\x00', 0x42, 0xa) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:38:25 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x17, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x9}, @exit, @ldst={0x1, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffff8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x4, 0x1, 0x2, 0x1, 0xa, 0x8, 0x4}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x1}, @func]}, &(0x7f0000000780)='GPL\x00', 0x6000000, 0xee, &(0x7f0000000880)=""/238, 0x40f00, 0xd, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x3, 0x5, 0x7, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000980)=[r0, r0, r1, 0x1, r0, r1, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x5, 0xf, 0x1}], 0x10, 0x7}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000ac0)={r2, r1}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDCLEARPOOL(r4, 0x5206, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="18360020210000000200000023c303caaf35c7c9a8354d9c127bc6d193631dcb59251bcd3dbda0d93648b96723f5771e6e27b37833e3d4379ac33046ef5e9f1b70e38b01d86c6d7494cfb9aa10d43013a63524c2f959e04a3cf8463252e09b8817260110ea3f6b6fe64f974adc"], &(0x7f0000000040)='GPL\x00', 0xa1, 0x2c, &(0x7f00000000c0)=""/44, 0x40f00, 0x19, '\x00', r3, 0x19, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0x0, 0x3, 0xd87}, 0x10, 0x25405, 0xffffffffffffffff, 0x1, &(0x7f0000000500)=[r1], &(0x7f0000000540)=[{0x5, 0x1, 0x2, 0xb}], 0x10, 0x5}, 0x90) 02:38:26 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$dir(0xffffff9c, &(0x7f00000001c0)='./file0\x00', 0x42, 0xa) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:26 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x17, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x9}, @exit, @ldst={0x1, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffff8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x4, 0x1, 0x2, 0x1, 0xa, 0x8, 0x4}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x1}, @func]}, &(0x7f0000000780)='GPL\x00', 0x6000000, 0xee, &(0x7f0000000880)=""/238, 0x40f00, 0xd, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x3, 0x5, 0x7, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000980)=[r0, r0, r1, 0x1, r0, r1, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x5, 0xf, 0x1}], 0x10, 0x7}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000ac0)={r2, r1}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDCLEARPOOL(r4, 0x5206, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="18360020210000000200000023c303caaf35c7c9a8354d9c127bc6d193631dcb59251bcd3dbda0d93648b96723f5771e6e27b37833e3d4379ac33046ef5e9f1b70e38b01d86c6d7494cfb9aa10d43013a63524c2f959e04a3cf8463252e09b8817260110ea3f6b6fe64f974adc"], &(0x7f0000000040)='GPL\x00', 0xa1, 0x2c, &(0x7f00000000c0)=""/44, 0x40f00, 0x19, '\x00', r3, 0x19, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0x0, 0x3, 0xd87}, 0x10, 0x25405, 0xffffffffffffffff, 0x1, &(0x7f0000000500)=[r1], &(0x7f0000000540)=[{0x5, 0x1, 0x2, 0xb}], 0x10, 0x5}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="18360020210000000200000023c303caaf35c7c9a8354d9c127bc6d193631dcb59251bcd3dbda0d93648b96723f5771e6e27b37833e3d4379ac33046ef5e9f1b70e38b01d86c6d7494cfb9aa10d43013a63524c2f959e04a3cf8463252e09b8817260110ea3f6b6fe64f974adc"], &(0x7f0000000040)='GPL\x00', 0xa1, 0x2c, &(0x7f00000000c0)=""/44, 0x40f00, 0x19, '\x00', r3, 0x19, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0x0, 0x3, 0xd87}, 0x10, 0x25405, 0xffffffffffffffff, 0x1, &(0x7f0000000500)=[r1], &(0x7f0000000540)=[{0x5, 0x1, 0x2, 0xb}], 0x10, 0x5}, 0x90) 02:38:26 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x17, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x9}, @exit, @ldst={0x1, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffff8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x4, 0x1, 0x2, 0x1, 0xa, 0x8, 0x4}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x1}, @func]}, &(0x7f0000000780)='GPL\x00', 0x6000000, 0xee, &(0x7f0000000880)=""/238, 0x40f00, 0xd, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x3, 0x5, 0x7, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000980)=[r0, r0, r1, 0x1, r0, r1, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x5, 0xf, 0x1}], 0x10, 0x7}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000ac0)={r2, r1}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDCLEARPOOL(r4, 0x5206, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="18360020210000000200000023c303caaf35c7c9a8354d9c127bc6d193631dcb59251bcd3dbda0d93648b96723f5771e6e27b37833e3d4379ac33046ef5e9f1b70e38b01d86c6d7494cfb9aa10d43013a63524c2f959e04a3cf8463252e09b8817260110ea3f6b6fe64f974adc"], &(0x7f0000000040)='GPL\x00', 0xa1, 0x2c, &(0x7f00000000c0)=""/44, 0x40f00, 0x19, '\x00', r3, 0x19, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0x0, 0x3, 0xd87}, 0x10, 0x25405, 0xffffffffffffffff, 0x1, &(0x7f0000000500)=[r1], &(0x7f0000000540)=[{0x5, 0x1, 0x2, 0xb}], 0x10, 0x5}, 0x90) 02:38:26 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a45352, &(0x7f0000000340)={{0x6, 0x1}, 'port0\x00', 0x2, 0x0, 0xfffffc01, 0x7ff, 0x8, 0x4, 0x1, 0x0, 0x0, 0x3f}) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x10) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000226bd7000fbdbdf2502000000060001000b00000005000400510000001400080076657468315f746f5f6272696467650014000800650005000d00000000000c000f0009000000000000000400"/90], 0x60}, 0x1, 0x0, 0x0, 0x4000810}, 0x8080) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000400)={{0xfe, 0x5}, 0x1, 0x1, 0x7f, {0x9, 0x1f}, 0x4, 0xffffffdd}) 02:38:26 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) 02:38:26 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a45352, &(0x7f0000000340)={{0x6, 0x1}, 'port0\x00', 0x2, 0x0, 0xfffffc01, 0x7ff, 0x8, 0x4, 0x1, 0x0, 0x0, 0x3f}) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x10) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000226bd7000fbdbdf2502000000060001000b00000005000400510000001400080076657468315f746f5f6272696467650014000800650005000d00000000000c000f0009000000000000000400"/90], 0x60}, 0x1, 0x0, 0x0, 0x4000810}, 0x8080) (async, rerun: 64) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000400)={{0xfe, 0x5}, 0x1, 0x1, 0x7f, {0x9, 0x1f}, 0x4, 0xffffffdd}) (rerun: 64) 02:38:26 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) 02:38:26 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a45352, &(0x7f0000000340)={{0x6, 0x1}, 'port0\x00', 0x2, 0x0, 0xfffffc01, 0x7ff, 0x8, 0x4, 0x1, 0x0, 0x0, 0x3f}) (async, rerun: 32) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x10) (rerun: 32) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000226bd7000fbdbdf2502000000060001000b00000005000400510000001400080076657468315f746f5f6272696467650014000800650005000d00000000000c000f0009000000000000000400"/90], 0x60}, 0x1, 0x0, 0x0, 0x4000810}, 0x8080) (async) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000400)={{0xfe, 0x5}, 0x1, 0x1, 0x7f, {0x9, 0x1f}, 0x4, 0xffffffdd}) 02:38:27 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840), 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) (async) 02:38:27 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x200c00, 0xb0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes256, 0x0, @desc1}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:27 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x200c00, 0xb0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes256, 0x0, @desc1}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:27 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x200c00, 0xb0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes256, 0x0, @desc1}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:27 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}}, 0x90) fanotify_mark(r0, 0x10, 0x8000039, r0, &(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000400)={0x4, 0x8, 0xfa00, {r3, 0xffffffff}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={r1}, 0x4) 02:38:27 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x2c4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2}, &(0x7f00000000c0), &(0x7f0000000180)=r3}, 0x20) 02:38:27 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async, rerun: 64) r2 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}}, 0x90) (async, rerun: 32) fanotify_mark(r0, 0x10, 0x8000039, r0, &(0x7f0000000440)='./file0\x00') (rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000400)={0x4, 0x8, 0xfa00, {r3, 0xffffffff}}, 0x10) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={r1}, 0x4) 02:38:28 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x2c4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2}, &(0x7f00000000c0), &(0x7f0000000180)=r3}, 0x20) 02:38:28 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}}, 0x90) fanotify_mark(r0, 0x10, 0x8000039, r0, &(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000400)={0x4, 0x8, 0xfa00, {r3, 0xffffffff}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={r1}, 0x4) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}}, 0x90) (async) fanotify_mark(r0, 0x10, 0x8000039, r0, &(0x7f0000000440)='./file0\x00') (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000400)={0x4, 0x8, 0xfa00, {r3, 0xffffffff}}, 0x10) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={r1}, 0x4) (async) 02:38:28 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x2c4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) (async) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2}, &(0x7f00000000c0), &(0x7f0000000180)=r3}, 0x20) 02:38:28 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x24) syz_open_dev$dri(&(0x7f0000000180), 0x8, 0x4000) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f00000001c0)='./file0/file0/file0\x00', r0}, 0x18) 02:38:28 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x40, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x3, 0x2, 0x4, "26a5e9abfcc5749cad476cc4df0f35f1ddddc6428393ae3da8f57398c9a8069e05f0eda4be15a15dcd70af488b937b534c49a55b37da2e993df6a03c422108590dfe8d944c23c4e754de6ca91c8fd9be8e685c54424fa377ccccaec208dd63aaa0ec1480dfe51c3f6479876497843d6c6553a4f8fa4dafdee36cc2da846100cbf2b75724f8c86eca729f3908c9f94ce202ecf20b9f751a1ce631c89ebaa8673a6cb55d06550197a62220576f4d2b2565d1012017d5c1b009f6b82b5bd9cfb10f262e0c78f2c643451e64938f652abe0f8c9b"}, 0xe2) 02:38:28 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x24) (async) syz_open_dev$dri(&(0x7f0000000180), 0x8, 0x4000) (async, rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r0) (async, rerun: 64) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f00000001c0)='./file0/file0/file0\x00', r0}, 0x18) 02:38:28 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x40, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x3, 0x2, 0x4, "26a5e9abfcc5749cad476cc4df0f35f1ddddc6428393ae3da8f57398c9a8069e05f0eda4be15a15dcd70af488b937b534c49a55b37da2e993df6a03c422108590dfe8d944c23c4e754de6ca91c8fd9be8e685c54424fa377ccccaec208dd63aaa0ec1480dfe51c3f6479876497843d6c6553a4f8fa4dafdee36cc2da846100cbf2b75724f8c86eca729f3908c9f94ce202ecf20b9f751a1ce631c89ebaa8673a6cb55d06550197a62220576f4d2b2565d1012017d5c1b009f6b82b5bd9cfb10f262e0c78f2c643451e64938f652abe0f8c9b"}, 0xe2) 02:38:29 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x24) (async) syz_open_dev$dri(&(0x7f0000000180), 0x8, 0x4000) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f00000001c0)='./file0/file0/file0\x00', r0}, 0x18) 02:38:29 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x40, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x3, 0x2, 0x4, "26a5e9abfcc5749cad476cc4df0f35f1ddddc6428393ae3da8f57398c9a8069e05f0eda4be15a15dcd70af488b937b534c49a55b37da2e993df6a03c422108590dfe8d944c23c4e754de6ca91c8fd9be8e685c54424fa377ccccaec208dd63aaa0ec1480dfe51c3f6479876497843d6c6553a4f8fa4dafdee36cc2da846100cbf2b75724f8c86eca729f3908c9f94ce202ecf20b9f751a1ce631c89ebaa8673a6cb55d06550197a62220576f4d2b2565d1012017d5c1b009f6b82b5bd9cfb10f262e0c78f2c643451e64938f652abe0f8c9b"}, 0xe2) (async) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x3, 0x2, 0x4, "26a5e9abfcc5749cad476cc4df0f35f1ddddc6428393ae3da8f57398c9a8069e05f0eda4be15a15dcd70af488b937b534c49a55b37da2e993df6a03c422108590dfe8d944c23c4e754de6ca91c8fd9be8e685c54424fa377ccccaec208dd63aaa0ec1480dfe51c3f6479876497843d6c6553a4f8fa4dafdee36cc2da846100cbf2b75724f8c86eca729f3908c9f94ce202ecf20b9f751a1ce631c89ebaa8673a6cb55d06550197a62220576f4d2b2565d1012017d5c1b009f6b82b5bd9cfb10f262e0c78f2c643451e64938f652abe0f8c9b"}, 0xe2) 02:38:30 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}], 0x10, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x1d, 0x14, &(0x7f0000000180)=@raw=[@alu={0x4, 0x0, 0x13, 0xa, 0xc, 0x8, 0x10}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x25}, @call={0x85, 0x0, 0x0, 0x34}, @jmp={0x5, 0x1, 0xc, 0x3, 0x3, 0xfffffffffffffffe, 0x1}], &(0x7f0000000000)='GPL\x00', 0x1, 0x4c, &(0x7f00000000c0)=""/76, 0x41000, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, 0x0, 0x6, &(0x7f0000000580), &(0x7f00000005c0)=[{0x4, 0x3, 0x4, 0x4}, {0x3, 0x1, 0x0, 0x9}, {0x5, 0x2, 0x1, 0x7}, {0x4, 0x2, 0xf, 0x9}, {0x4, 0x3, 0x10}, {0x0, 0x3, 0x0, 0x5}], 0x10, 0xfffffff9}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r1, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000009c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0x1a, 0xf34, 0x6, 0x200, 0x20, 0xffffffffffffffff, 0x8000, '\x00', 0x0, r1, 0x0, 0x3, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0xb, 0x13, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1ff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@exit, @alu={0x4, 0x1, 0xb, 0x6, 0x3, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000580)='syzkaller\x00', 0x0, 0xe2, &(0x7f0000000880)=""/226, 0x40f00, 0x4, '\x00', r4, 0x21, r1, 0x8, &(0x7f0000000c00)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x1, 0x0, 0x6, 0x3f}, 0x10, r2, r1, 0x1, &(0x7f0000000d00)=[r3, r3, r0, r5], &(0x7f0000000d40)=[{0x3, 0x2, 0xf, 0x7}], 0x10, 0xbb}, 0x90) 02:38:30 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000001c0), 0xffff7fff, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000400)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0xa, 0x1, 0x3, 0x4}) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000240)={0x0, 0x0, r3, 0x0, 0x0, 0x2, &(0x7f0000000440)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r1, 0xc01864b1, &(0x7f00000002c0)={r5, 0x1, 0xffff, 0x2, &(0x7f0000000280)=[{0x400, 0x7, 0x3, 0x9dd1}, {0x8000, 0x1182, 0x7, 0x8000}]}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f0000000180)={r6, &(0x7f0000000100)=""/65}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000200)={r4, r2, 0x4, 0x3, 0x400}) 02:38:30 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}], 0x10, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x1d, 0x14, &(0x7f0000000180)=@raw=[@alu={0x4, 0x0, 0x13, 0xa, 0xc, 0x8, 0x10}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x25}, @call={0x85, 0x0, 0x0, 0x34}, @jmp={0x5, 0x1, 0xc, 0x3, 0x3, 0xfffffffffffffffe, 0x1}], &(0x7f0000000000)='GPL\x00', 0x1, 0x4c, &(0x7f00000000c0)=""/76, 0x41000, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, 0x0, 0x6, &(0x7f0000000580), &(0x7f00000005c0)=[{0x4, 0x3, 0x4, 0x4}, {0x3, 0x1, 0x0, 0x9}, {0x5, 0x2, 0x1, 0x7}, {0x4, 0x2, 0xf, 0x9}, {0x4, 0x3, 0x10}, {0x0, 0x3, 0x0, 0x5}], 0x10, 0xfffffff9}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r1, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000009c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0x1a, 0xf34, 0x6, 0x200, 0x20, 0xffffffffffffffff, 0x8000, '\x00', 0x0, r1, 0x0, 0x3, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0xb, 0x13, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1ff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@exit, @alu={0x4, 0x1, 0xb, 0x6, 0x3, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000580)='syzkaller\x00', 0x0, 0xe2, &(0x7f0000000880)=""/226, 0x40f00, 0x4, '\x00', r4, 0x21, r1, 0x8, &(0x7f0000000c00)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x1, 0x0, 0x6, 0x3f}, 0x10, r2, r1, 0x1, &(0x7f0000000d00)=[r3, r3, r0, r5], &(0x7f0000000d40)=[{0x3, 0x2, 0xf, 0x7}], 0x10, 0xbb}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}], 0x10, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x1d, 0x14, &(0x7f0000000180)=@raw=[@alu={0x4, 0x0, 0x13, 0xa, 0xc, 0x8, 0x10}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x25}, @call={0x85, 0x0, 0x0, 0x34}, @jmp={0x5, 0x1, 0xc, 0x3, 0x3, 0xfffffffffffffffe, 0x1}], &(0x7f0000000000)='GPL\x00', 0x1, 0x4c, &(0x7f00000000c0)=""/76, 0x41000, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, 0x0, 0x6, &(0x7f0000000580), &(0x7f00000005c0)=[{0x4, 0x3, 0x4, 0x4}, {0x3, 0x1, 0x0, 0x9}, {0x5, 0x2, 0x1, 0x7}, {0x4, 0x2, 0xf, 0x9}, {0x4, 0x3, 0x10}, {0x0, 0x3, 0x0, 0x5}], 0x10, 0xfffffff9}, 0x90) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r1, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000009c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0x1a, 0xf34, 0x6, 0x200, 0x20, 0xffffffffffffffff, 0x8000, '\x00', 0x0, r1, 0x0, 0x3, 0x4}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0xb, 0x13, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1ff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@exit, @alu={0x4, 0x1, 0xb, 0x6, 0x3, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000580)='syzkaller\x00', 0x0, 0xe2, &(0x7f0000000880)=""/226, 0x40f00, 0x4, '\x00', r4, 0x21, r1, 0x8, &(0x7f0000000c00)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x1, 0x0, 0x6, 0x3f}, 0x10, r2, r1, 0x1, &(0x7f0000000d00)=[r3, r3, r0, r5], &(0x7f0000000d40)=[{0x3, 0x2, 0xf, 0x7}], 0x10, 0xbb}, 0x90) (async) 02:38:30 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000001c0), 0xffff7fff, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000400)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0xa, 0x1, 0x3, 0x4}) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000240)={0x0, 0x0, r3, 0x0, 0x0, 0x2, &(0x7f0000000440)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r1, 0xc01864b1, &(0x7f00000002c0)={r5, 0x1, 0xffff, 0x2, &(0x7f0000000280)=[{0x400, 0x7, 0x3, 0x9dd1}, {0x8000, 0x1182, 0x7, 0x8000}]}) (async) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f0000000180)={r6, &(0x7f0000000100)=""/65}) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000200)={r4, r2, 0x4, 0x3, 0x400}) 02:38:30 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000001c0), 0xffff7fff, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000400)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0xa, 0x1, 0x3, 0x4}) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000240)={0x0, 0x0, r3, 0x0, 0x0, 0x2, &(0x7f0000000440)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r1, 0xc01864b1, &(0x7f00000002c0)={r5, 0x1, 0xffff, 0x2, &(0x7f0000000280)=[{0x400, 0x7, 0x3, 0x9dd1}, {0x8000, 0x1182, 0x7, 0x8000}]}) (async) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f0000000180)={r6, &(0x7f0000000100)=""/65}) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000200)={r4, r2, 0x4, 0x3, 0x400}) 02:38:31 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}], 0x10, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x1d, 0x14, &(0x7f0000000180)=@raw=[@alu={0x4, 0x0, 0x13, 0xa, 0xc, 0x8, 0x10}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x25}, @call={0x85, 0x0, 0x0, 0x34}, @jmp={0x5, 0x1, 0xc, 0x3, 0x3, 0xfffffffffffffffe, 0x1}], &(0x7f0000000000)='GPL\x00', 0x1, 0x4c, &(0x7f00000000c0)=""/76, 0x41000, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, 0x0, 0x6, &(0x7f0000000580), &(0x7f00000005c0)=[{0x4, 0x3, 0x4, 0x4}, {0x3, 0x1, 0x0, 0x9}, {0x5, 0x2, 0x1, 0x7}, {0x4, 0x2, 0xf, 0x9}, {0x4, 0x3, 0x10}, {0x0, 0x3, 0x0, 0x5}], 0x10, 0xfffffff9}, 0x90) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r1, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000009c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0x1a, 0xf34, 0x6, 0x200, 0x20, 0xffffffffffffffff, 0x8000, '\x00', 0x0, r1, 0x0, 0x3, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0xb, 0x13, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1ff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@exit, @alu={0x4, 0x1, 0xb, 0x6, 0x3, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000580)='syzkaller\x00', 0x0, 0xe2, &(0x7f0000000880)=""/226, 0x40f00, 0x4, '\x00', r4, 0x21, r1, 0x8, &(0x7f0000000c00)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x1, 0x0, 0x6, 0x3f}, 0x10, r2, r1, 0x1, &(0x7f0000000d00)=[r3, r3, r0, r5], &(0x7f0000000d40)=[{0x3, 0x2, 0xf, 0x7}], 0x10, 0xbb}, 0x90) 02:38:31 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x10800, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0x100}}, 0x10) 02:38:31 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x400, 0x58) mknodat$null(r1, &(0x7f0000000040)='./file0/file0\x00', 0x400, 0x103) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000000c0)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:38:31 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x400, 0x58) (async) r1 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x400, 0x58) mknodat$null(r1, &(0x7f0000000040)='./file0/file0\x00', 0x400, 0x103) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000000c0)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:38:31 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x10800, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0x100}}, 0x10) 02:38:31 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x400, 0x58) mknodat$null(r1, &(0x7f0000000040)='./file0/file0\x00', 0x400, 0x103) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000000c0)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x400, 0x58) (async) mknodat$null(r1, &(0x7f0000000040)='./file0/file0\x00', 0x400, 0x103) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000000c0)) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) (async) 02:38:31 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x10800, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0x100}}, 0x10) 02:38:31 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f00000000c0)='./file0/file0\x00', r1}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:32 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f00000000c0)='./file0/file0\x00', r1}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:32 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) 02:38:32 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f00000000c0)='./file0/file0\x00', r1}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:32 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) 02:38:32 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) 02:38:32 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x3, 0x0, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:33 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000240)='%pi6 \x00'}, 0x20) r1 = openat$rdma_cm(0xffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000300)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x1, {"d2b340f3968258867f302b0223d44818"}, 0x11b74370, 0x3, 0xbe}}}, 0x90) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f00000001c0)={@id={0x2, 0x0, @c}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000100)={0x40, 0x2, 'client0\x00', 0x0, "0d30f1f71b0be028", "a493b1c9bd2f647e21053e8328c736350aa9d4529d01a2057b76493a528ac41a", 0x4, 0x401}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:33 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000240)='%pi6 \x00'}, 0x20) r1 = openat$rdma_cm(0xffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000300)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x1, {"d2b340f3968258867f302b0223d44818"}, 0x11b74370, 0x3, 0xbe}}}, 0x90) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f00000001c0)={@id={0x2, 0x0, @c}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000100)={0x40, 0x2, 'client0\x00', 0x0, "0d30f1f71b0be028", "a493b1c9bd2f647e21053e8328c736350aa9d4529d01a2057b76493a528ac41a", 0x4, 0x401}) (async) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000100)={0x40, 0x2, 'client0\x00', 0x0, "0d30f1f71b0be028", "a493b1c9bd2f647e21053e8328c736350aa9d4529d01a2057b76493a528ac41a", 0x4, 0x401}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:33 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x3, 0x0, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:33 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000240)='%pi6 \x00'}, 0x20) r1 = openat$rdma_cm(0xffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000300)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x1, {"d2b340f3968258867f302b0223d44818"}, 0x11b74370, 0x3, 0xbe}}}, 0x90) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f00000001c0)={@id={0x2, 0x0, @c}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000100)={0x40, 0x2, 'client0\x00', 0x0, "0d30f1f71b0be028", "a493b1c9bd2f647e21053e8328c736350aa9d4529d01a2057b76493a528ac41a", 0x4, 0x401}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000240)='%pi6 \x00'}, 0x20) (async) openat$rdma_cm(0xffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000300)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x1, {"d2b340f3968258867f302b0223d44818"}, 0x11b74370, 0x3, 0xbe}}}, 0x90) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f00000001c0)={@id={0x2, 0x0, @c}}) (async) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000100)={0x40, 0x2, 'client0\x00', 0x0, "0d30f1f71b0be028", "a493b1c9bd2f647e21053e8328c736350aa9d4529d01a2057b76493a528ac41a", 0x4, 0x401}) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:38:33 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x3, 0x0, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:33 executing program 1: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff, '\x00', 0x0, r0}, 0x48) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r1, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r1, 0xffffffffffffffff}, 0x3) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000140)={0x0, 0x2, {0x1, 0x0, 0x1, 0x0, 0x1}, 0x7}) 02:38:33 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e24, 0x3f, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x11}}, 0x141}}}, 0x90) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000100)={0x2, 0x0, &(0x7f0000000080)=[0x0, 0x0]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', r0}, 0x18) 02:38:34 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e24, 0x3f, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x11}}, 0x141}}}, 0x90) (async) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000100)={0x2, 0x0, &(0x7f0000000080)=[0x0, 0x0]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', r0}, 0x18) 02:38:34 executing program 1: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff, '\x00', 0x0, r0}, 0x48) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r1, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r1, 0xffffffffffffffff}, 0x3) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) (async) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000140)={0x0, 0x2, {0x1, 0x0, 0x1, 0x0, 0x1}, 0x7}) 02:38:34 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e24, 0x3f, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x11}}, 0x141}}}, 0x90) (async) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000100)={0x2, 0x0, &(0x7f0000000080)=[0x0, 0x0]}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', r0}, 0x18) 02:38:34 executing program 1: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff, '\x00', 0x0, r0}, 0x48) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r1, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r1, 0xffffffffffffffff}, 0x3) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) (async) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000140)={0x0, 0x2, {0x1, 0x0, 0x1, 0x0, 0x1}, 0x7}) 02:38:34 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x5, 0x1, 0x5, 0x1}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={r1, 0x7, 0x9, 0x5, 0x3, [], [0x7, 0x9, 0x7, 0x990], [0x7fffffff, 0x0, 0x6, 0x40], [0x7fffffffffffffff, 0xffff, 0x1ff, 0x9]}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:34 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) 02:38:34 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x5, 0x1, 0x5, 0x1}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={r1, 0x7, 0x9, 0x5, 0x3, [], [0x7, 0x9, 0x7, 0x990], [0x7fffffff, 0x0, 0x6, 0x40], [0x7fffffffffffffff, 0xffff, 0x1ff, 0x9]}) (async, rerun: 32) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (rerun: 32) 02:38:34 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) 02:38:34 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x5, 0x1, 0x5, 0x1}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={r1, 0x7, 0x9, 0x5, 0x3, [], [0x7, 0x9, 0x7, 0x990], [0x7fffffff, 0x0, 0x6, 0x40], [0x7fffffffffffffff, 0xffff, 0x1ff, 0x9]}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x5, 0x1, 0x5, 0x1}) (async) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={r1, 0x7, 0x9, 0x5, 0x3, [], [0x7, 0x9, 0x7, 0x990], [0x7fffffff, 0x0, 0x6, 0x40], [0x7fffffffffffffff, 0xffff, 0x1ff, 0x9]}) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:38:35 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) 02:38:35 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000040)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xd, 0x6, 0x8, 0x7fff, 0x0, 0x1, 0x2, '\x00', r2, r0, 0x3, 0x3, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x12, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x8}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @jmp={0x5, 0x1, 0xd, 0x1, 0x9, 0x0, 0x1}, @ldst={0x2, 0x3, 0x1, 0x8, 0x5, 0x1, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc34c}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffc, 0x77, &(0x7f0000000580)=""/119, 0x41100, 0x20, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x0, 0x2, 0x80000000, 0x7}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000680)=[{0x0, 0x2, 0x1, 0x3}, {0x4, 0x3, 0xe}, {0x0, 0x1, 0xb, 0xb}, {0x2, 0x4, 0xa, 0x8}, {0x3, 0x4, 0xd, 0x1}, {0x1, 0x1, 0xa, 0x1}, {0x5, 0x2, 0x3, 0x9fa08fc877990416}]}, 0x90) 02:38:35 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) renameat2(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x4) readlinkat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/234, 0xea) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f00000001c0)={0x1f, 0x20, 0x81}) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x7) 02:38:35 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000040)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xd, 0x6, 0x8, 0x7fff, 0x0, 0x1, 0x2, '\x00', r2, r0, 0x3, 0x3, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x12, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x8}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @jmp={0x5, 0x1, 0xd, 0x1, 0x9, 0x0, 0x1}, @ldst={0x2, 0x3, 0x1, 0x8, 0x5, 0x1, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc34c}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffc, 0x77, &(0x7f0000000580)=""/119, 0x41100, 0x20, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x0, 0x2, 0x80000000, 0x7}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000680)=[{0x0, 0x2, 0x1, 0x3}, {0x4, 0x3, 0xe}, {0x0, 0x1, 0xb, 0xb}, {0x2, 0x4, 0xa, 0x8}, {0x3, 0x4, 0xd, 0x1}, {0x1, 0x1, 0xa, 0x1}, {0x5, 0x2, 0x3, 0x9fa08fc877990416}]}, 0x90) 02:38:35 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) renameat2(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x4) (async) readlinkat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/234, 0xea) (async) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f00000001c0)={0x1f, 0x20, 0x81}) (async) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x7) 02:38:35 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000040)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xd, 0x6, 0x8, 0x7fff, 0x0, 0x1, 0x2, '\x00', r2, r0, 0x3, 0x3, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x12, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x8}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @jmp={0x5, 0x1, 0xd, 0x1, 0x9, 0x0, 0x1}, @ldst={0x2, 0x3, 0x1, 0x8, 0x5, 0x1, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc34c}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffc, 0x77, &(0x7f0000000580)=""/119, 0x41100, 0x20, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x0, 0x2, 0x80000000, 0x7}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000680)=[{0x0, 0x2, 0x1, 0x3}, {0x4, 0x3, 0xe}, {0x0, 0x1, 0xb, 0xb}, {0x2, 0x4, 0xa, 0x8}, {0x3, 0x4, 0xd, 0x1}, {0x1, 0x1, 0xa, 0x1}, {0x5, 0x2, 0x3, 0x9fa08fc877990416}]}, 0x90) 02:38:35 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) renameat2(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x4) readlinkat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/234, 0xea) (async) readlinkat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/234, 0xea) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f00000001c0)={0x1f, 0x20, 0x81}) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x7) 02:38:36 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000000)={@map=r0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x3721, 0x0, r0, 0x2, '\x00', 0x0, r0, 0x3, 0x2, 0x3}, 0x48) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000180)={r2, 0x1}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x0, '\x00', 0x0, r0}, 0x48) syz_open_dev$rtc(&(0x7f0000000000), 0x4, 0x80) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) 02:38:36 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x12916e8e0d988787, 0x1) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', r0, &(0x7f0000000100)='./file0/file0/file0\x00', 0x1400) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000080)={0x2, 0x8, 0x3f, 0x5, 0x5, 0xffffff80}) 02:38:36 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000000)={@map=r0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x3721, 0x0, r0, 0x2, '\x00', 0x0, r0, 0x3, 0x2, 0x3}, 0x48) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000180)={r2, 0x1}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x0, '\x00', 0x0, r0}, 0x48) syz_open_dev$rtc(&(0x7f0000000000), 0x4, 0x80) (async) syz_open_dev$rtc(&(0x7f0000000000), 0x4, 0x80) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) 02:38:36 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x12916e8e0d988787, 0x1) (async) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', r0, &(0x7f0000000100)='./file0/file0/file0\x00', 0x1400) (async) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000080)={0x2, 0x8, 0x3f, 0x5, 0x5, 0xffffff80}) 02:38:36 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000000)={@map=r0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x3721, 0x0, r0, 0x2, '\x00', 0x0, r0, 0x3, 0x2, 0x3}, 0x48) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000180)={r2, 0x1}) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x0, '\x00', 0x0, r0}, 0x48) (async) syz_open_dev$rtc(&(0x7f0000000000), 0x4, 0x80) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) 02:38:36 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async, rerun: 32) syz_init_net_socket$nfc_llcp(0x27, 0x12916e8e0d988787, 0x1) (rerun: 32) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', r0, &(0x7f0000000100)='./file0/file0/file0\x00', 0x1400) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000080)={0x2, 0x8, 0x3f, 0x5, 0x5, 0xffffff80}) 02:38:36 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x4000000, 0x0, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1}, 0x4) openat$sndseq(0xffffff9c, &(0x7f0000000200), 0x460000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:38:37 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x4000000, 0x0, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1}, 0x4) (async) openat$sndseq(0xffffff9c, &(0x7f0000000200), 0x460000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:38:37 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$dir(0xffffff9c, &(0x7f0000000000)='./file0\x00', 0x250003, 0x8c) r1 = openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x20400, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r2, &(0x7f0000000200)="c8b58ad6f9663ff1667f0d12204d9cffb5c02e153d03444631641d6f9aa3d59962e272634b4d7211682f9a547249f27248829a2498bfcd17f0b93c6d881b9c3e9cd3e4cbfe2e6ab915e3f1dd3c3226c4a5a1c21c36cb8d593b02818069e8febf64e13b06debc50d3d9c56f113712e2c4d97c1734d885f4661cc7ccff416aff0c64bea88bb759f70809df8990953c2be9142bdc11e23de2c3cb16a029026252242bde8cc869f7066c70e62196d902c478f35baac073403c4c", &(0x7f00000002c0)=""/63, 0x4}, 0x20) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_IRQP_READ(r3, 0x8004700b, 0x0) linkat(r1, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00', 0x400) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={@desc={0x1, 0x0, @desc4}}) 02:38:37 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x4000000, 0x0, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1}, 0x4) openat$sndseq(0xffffff9c, &(0x7f0000000200), 0x460000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r0}, 0x18) 02:38:37 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8000}, [@tail_call, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0xf1d3}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x2f, &(0x7f0000000100)=""/47, 0x40e00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x4, 0x1, 0x6}, 0x10, 0x2e597, 0xffffffffffffffff, 0x2, &(0x7f0000000200)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x3, 0x2, 0x6, 0x9}, {0x5, 0x1, 0xb, 0x9}], 0x10, 0x2}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0x1, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000480)={r0, r1}, 0xc) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:37 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$dir(0xffffff9c, &(0x7f0000000000)='./file0\x00', 0x250003, 0x8c) (async) r1 = openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x20400, 0x9) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r2, &(0x7f0000000200)="c8b58ad6f9663ff1667f0d12204d9cffb5c02e153d03444631641d6f9aa3d59962e272634b4d7211682f9a547249f27248829a2498bfcd17f0b93c6d881b9c3e9cd3e4cbfe2e6ab915e3f1dd3c3226c4a5a1c21c36cb8d593b02818069e8febf64e13b06debc50d3d9c56f113712e2c4d97c1734d885f4661cc7ccff416aff0c64bea88bb759f70809df8990953c2be9142bdc11e23de2c3cb16a029026252242bde8cc869f7066c70e62196d902c478f35baac073403c4c", &(0x7f00000002c0)=""/63, 0x4}, 0x20) (async) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_IRQP_READ(r3, 0x8004700b, 0x0) (async) linkat(r1, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00', 0x400) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={@desc={0x1, 0x0, @desc4}}) 02:38:37 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8000}, [@tail_call, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0xf1d3}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x2f, &(0x7f0000000100)=""/47, 0x40e00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x4, 0x1, 0x6}, 0x10, 0x2e597, 0xffffffffffffffff, 0x2, &(0x7f0000000200)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x3, 0x2, 0x6, 0x9}, {0x5, 0x1, 0xb, 0x9}], 0x10, 0x2}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0x1, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000480)={r0, r1}, 0xc) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:38 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$dir(0xffffff9c, &(0x7f0000000000)='./file0\x00', 0x250003, 0x8c) (async) r1 = openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x20400, 0x9) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r2, &(0x7f0000000200)="c8b58ad6f9663ff1667f0d12204d9cffb5c02e153d03444631641d6f9aa3d59962e272634b4d7211682f9a547249f27248829a2498bfcd17f0b93c6d881b9c3e9cd3e4cbfe2e6ab915e3f1dd3c3226c4a5a1c21c36cb8d593b02818069e8febf64e13b06debc50d3d9c56f113712e2c4d97c1734d885f4661cc7ccff416aff0c64bea88bb759f70809df8990953c2be9142bdc11e23de2c3cb16a029026252242bde8cc869f7066c70e62196d902c478f35baac073403c4c", &(0x7f00000002c0)=""/63, 0x4}, 0x20) (async) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_IRQP_READ(r3, 0x8004700b, 0x0) linkat(r1, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00', 0x400) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000100)={@desc={0x1, 0x0, @desc4}}) 02:38:38 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8000}, [@tail_call, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0xf1d3}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x2f, &(0x7f0000000100)=""/47, 0x40e00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x4, 0x1, 0x6}, 0x10, 0x2e597, 0xffffffffffffffff, 0x2, &(0x7f0000000200)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x3, 0x2, 0x6, 0x9}, {0x5, 0x1, 0xb, 0x9}], 0x10, 0x2}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0x1, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000480)={r0, r1}, 0xc) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:38 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) r2 = openat$random(0xffffff9c, &(0x7f0000000000), 0x206801, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000040)={0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}], 0x10, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000100)={r3, 0x2}) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000480)=0x3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:38 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) r2 = openat$random(0xffffff9c, &(0x7f0000000000), 0x206801, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000040)={0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}], 0x10, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) (async, rerun: 64) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000100)={r3, 0x2}) (rerun: 64) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000480)=0x3) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:39 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000140), 0x200, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000100)=0x0) connect$nfc_llcp(r2, &(0x7f0000000180)={0x27, r3, 0x0, 0x1, 0xa9, 0x4, "4e4e88016ae0087efa67e882865761da932443931d6c868d747e3ffd25015c2d14dee19f62b5df551c4f89beb3293a58007f32139b2d3c3f10c70334f4f675", 0x33}, 0x58) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r1, 0xc02064b9, &(0x7f0000000200)={0x0, 0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000080)={0x0, 0x3}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:39 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) r2 = openat$random(0xffffff9c, &(0x7f0000000000), 0x206801, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000040)={0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}], 0x10, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000100)={r3, 0x2}) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000480)=0x3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$RTC_PIE_OFF(r1, 0x7006) (async) openat$random(0xffffff9c, &(0x7f0000000000), 0x206801, 0x0) (async) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000040)) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}], 0x10, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) (async) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000100)={r3, 0x2}) (async) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000480)=0x3) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) 02:38:39 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) r1 = syz_open_dev$dri(&(0x7f0000000140), 0x200, 0x0) (async) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000100)=0x0) connect$nfc_llcp(r2, &(0x7f0000000180)={0x27, r3, 0x0, 0x1, 0xa9, 0x4, "4e4e88016ae0087efa67e882865761da932443931d6c868d747e3ffd25015c2d14dee19f62b5df551c4f89beb3293a58007f32139b2d3c3f10c70334f4f675", 0x33}, 0x58) (async) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r1, 0xc02064b9, &(0x7f0000000200)={0x0, 0x0}) (async) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000080)={0x0, 0x3}) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:39 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000200), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r2, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1c, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0001010007000000"], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x10, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x28589, r2, 0x2, &(0x7f00000004c0)=[r0, r0, r0, r0, r0], &(0x7f0000000500)=[{0x3, 0x1, 0x7}, {0x3, 0x5, 0x4, 0x4}], 0x10, 0x80000001}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:39 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000140), 0x200, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000100)=0x0) connect$nfc_llcp(r2, &(0x7f0000000180)={0x27, r3, 0x0, 0x1, 0xa9, 0x4, "4e4e88016ae0087efa67e882865761da932443931d6c868d747e3ffd25015c2d14dee19f62b5df551c4f89beb3293a58007f32139b2d3c3f10c70334f4f675", 0x33}, 0x58) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r1, 0xc02064b9, &(0x7f0000000200)={0x0, 0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000080)={0x0, 0x3}) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) syz_open_dev$dri(&(0x7f0000000140), 0x200, 0x0) (async) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000100)) (async) connect$nfc_llcp(r2, &(0x7f0000000180)={0x27, r3, 0x0, 0x1, 0xa9, 0x4, "4e4e88016ae0087efa67e882865761da932443931d6c868d747e3ffd25015c2d14dee19f62b5df551c4f89beb3293a58007f32139b2d3c3f10c70334f4f675", 0x33}, 0x58) (async) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r1, 0xc02064b9, &(0x7f0000000200)={0x0, 0x0}) (async) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000080)={0x0, 0x3}) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:38:39 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000200), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r2, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1c, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0001010007000000"], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x10, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x28589, r2, 0x2, &(0x7f00000004c0)=[r0, r0, r0, r0, r0], &(0x7f0000000500)=[{0x3, 0x1, 0x7}, {0x3, 0x5, 0x4, 0x4}], 0x10, 0x80000001}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000200), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r2, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1c, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0001010007000000"], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x10, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x28589, r2, 0x2, &(0x7f00000004c0)=[r0, r0, r0, r0, r0], &(0x7f0000000500)=[{0x3, 0x1, 0x7}, {0x3, 0x5, 0x4, 0x4}], 0x10, 0x80000001}, 0x90) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) (async) 02:38:40 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x101100, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x400) 02:38:40 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000200), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r2, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1c, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0001010007000000"], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x10, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x28589, r2, 0x2, &(0x7f00000004c0)=[r0, r0, r0, r0, r0], &(0x7f0000000500)=[{0x3, 0x1, 0x7}, {0x3, 0x5, 0x4, 0x4}], 0x10, 0x80000001}, 0x90) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:40 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x101100, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x400) 02:38:40 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:40 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x101100, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x400) (async) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x400) 02:38:40 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:40 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x20000, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) mknodat$null(r0, &(0x7f0000000080)='./file0\x00', 0x800, 0x103) 02:38:40 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:40 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x20000, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) mknodat$null(r0, &(0x7f0000000080)='./file0\x00', 0x800, 0x103) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x20000, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) mknodat$null(r0, &(0x7f0000000080)='./file0\x00', 0x800, 0x103) (async) 02:38:41 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x20000, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) mknodat$null(r0, &(0x7f0000000080)='./file0\x00', 0x800, 0x103) 02:38:41 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x202103, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r1) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r1) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000240)={@desc={0x1, 0x0, @auto="0c20fadead6096be"}}) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="39dafdc4b7732fff5a2d28c2c53601fc03cd8b3be0210000009db0f39700d437bf675984c6251b17047d72b2288e23ffb946f0765990f30e256d38978f5ee0b09f7672eb4d304b048d9705fe6d773228f0e6467e418b64c6ae9aa5956eaa4918d31ef2d3e0b947ad2761c1f0d2c4f6dcb47b98dedcda34b9aa", @ANYRES16=r2, @ANYBLOB="000125bd7000fddbdf2508000000"], 0x14}}, 0x24000081) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000380)={0x401, 0x8001, 0xfffffffa}) 02:38:41 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x9, 0x547800) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f00000000c0)={r3}) 02:38:41 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x9, 0x547800) (async) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f00000000c0)={r3}) 02:38:41 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x202103, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r1) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r1) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000240)={@desc={0x1, 0x0, @auto="0c20fadead6096be"}}) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="39dafdc4b7732fff5a2d28c2c53601fc03cd8b3be0210000009db0f39700d437bf675984c6251b17047d72b2288e23ffb946f0765990f30e256d38978f5ee0b09f7672eb4d304b048d9705fe6d773228f0e6467e418b64c6ae9aa5956eaa4918d31ef2d3e0b947ad2761c1f0d2c4f6dcb47b98dedcda34b9aa", @ANYRES16=r2, @ANYBLOB="000125bd7000fddbdf2508000000"], 0x14}}, 0x24000081) (async) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="39dafdc4b7732fff5a2d28c2c53601fc03cd8b3be0210000009db0f39700d437bf675984c6251b17047d72b2288e23ffb946f0765990f30e256d38978f5ee0b09f7672eb4d304b048d9705fe6d773228f0e6467e418b64c6ae9aa5956eaa4918d31ef2d3e0b947ad2761c1f0d2c4f6dcb47b98dedcda34b9aa", @ANYRES16=r2, @ANYBLOB="000125bd7000fddbdf2508000000"], 0x14}}, 0x24000081) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000380)={0x401, 0x8001, 0xfffffffa}) (async) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000380)={0x401, 0x8001, 0xfffffffa}) 02:38:41 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x9, 0x547800) (async) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f00000000c0)={r3}) 02:38:41 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000080), 0x202103, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r1) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r1) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000240)={@desc={0x1, 0x0, @auto="0c20fadead6096be"}}) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="39dafdc4b7732fff5a2d28c2c53601fc03cd8b3be0210000009db0f39700d437bf675984c6251b17047d72b2288e23ffb946f0765990f30e256d38978f5ee0b09f7672eb4d304b048d9705fe6d773228f0e6467e418b64c6ae9aa5956eaa4918d31ef2d3e0b947ad2761c1f0d2c4f6dcb47b98dedcda34b9aa", @ANYRES16=r2, @ANYBLOB="000125bd7000fddbdf2508000000"], 0x14}}, 0x24000081) (async, rerun: 64) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000380)={0x401, 0x8001, 0xfffffffa}) (rerun: 64) 02:38:41 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r4, 0xc01c64ad, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x15, 0x10, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f}, [@ldst={0x3, 0x3, 0x1, 0x8, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @generic={0x1, 0x9, 0xd, 0x6, 0x20}, @generic={0x6, 0x4, 0x1, 0x8001, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x65f832e5}, @alu={0x7, 0x1, 0x2, 0x7, 0x3, 0x100, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x87, 0xf, 0x4, 0x8, 0x4dc}]}, &(0x7f0000000180)='GPL\x00', 0x7, 0xbd, &(0x7f00000002c0)=""/189, 0x41100, 0x10, '\x00', r3, 0x2, r4, 0x8, &(0x7f0000000600)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x0, 0x20, 0x1}, 0x10, 0x0, r5, 0x0, &(0x7f00000006c0)=[r0, r0, r0, r1], 0x0, 0x10, 0x7}, 0x90) 02:38:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x9, 0x220000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000200)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x6, 0x1, 0x4, 0x4}) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r4, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f00000002c0)={r3, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETPLANE(r4, 0xc02064b6, &(0x7f0000000340)={0x0, r2, r1, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000380)={r5, r6, r7, 0x5, 0x0, 0x1, 0x3, 0xffffffff, 0x5, 0xf0c}) 02:38:42 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r4, 0xc01c64ad, 0x0) (async) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x15, 0x10, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f}, [@ldst={0x3, 0x3, 0x1, 0x8, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @generic={0x1, 0x9, 0xd, 0x6, 0x20}, @generic={0x6, 0x4, 0x1, 0x8001, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x65f832e5}, @alu={0x7, 0x1, 0x2, 0x7, 0x3, 0x100, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x87, 0xf, 0x4, 0x8, 0x4dc}]}, &(0x7f0000000180)='GPL\x00', 0x7, 0xbd, &(0x7f00000002c0)=""/189, 0x41100, 0x10, '\x00', r3, 0x2, r4, 0x8, &(0x7f0000000600)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x0, 0x20, 0x1}, 0x10, 0x0, r5, 0x0, &(0x7f00000006c0)=[r0, r0, r0, r1], 0x0, 0x10, 0x7}, 0x90) 02:38:42 executing program 1: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x48) (async) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r4, 0xc01c64ad, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETFB(r4, 0xc01c64ad, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x15, 0x10, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f}, [@ldst={0x3, 0x3, 0x1, 0x8, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @generic={0x1, 0x9, 0xd, 0x6, 0x20}, @generic={0x6, 0x4, 0x1, 0x8001, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x65f832e5}, @alu={0x7, 0x1, 0x2, 0x7, 0x3, 0x100, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x87, 0xf, 0x4, 0x8, 0x4dc}]}, &(0x7f0000000180)='GPL\x00', 0x7, 0xbd, &(0x7f00000002c0)=""/189, 0x41100, 0x10, '\x00', r3, 0x2, r4, 0x8, &(0x7f0000000600)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x0, 0x20, 0x1}, 0x10, 0x0, r5, 0x0, &(0x7f00000006c0)=[r0, r0, r0, r1], 0x0, 0x10, 0x7}, 0x90) 02:38:42 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x9, 0x220000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000200)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x6, 0x1, 0x4, 0x4}) (async) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r4, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f00000002c0)={r3, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETPLANE(r4, 0xc02064b6, &(0x7f0000000340)={0x0, r2, r1, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000380)={r5, r6, r7, 0x5, 0x0, 0x1, 0x3, 0xffffffff, 0x5, 0xf0c}) 02:38:42 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x9, 0x220000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000200)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x6, 0x1, 0x4, 0x4}) r4 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r4, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) (async) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f00000002c0)={r3, 0x0, 0x0}) (async) ioctl$DRM_IOCTL_MODE_GETPLANE(r4, 0xc02064b6, &(0x7f0000000340)={0x0, r2, r1, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000380)={r5, r6, r7, 0x5, 0x0, 0x1, 0x3, 0xffffffff, 0x5, 0xf0c}) 02:38:42 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) faccessat2(r0, &(0x7f0000000080)='./file0\x00', 0x35, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x4, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040840}, 0x8000) 02:38:43 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) faccessat2(r0, &(0x7f0000000080)='./file0\x00', 0x35, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x4, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040840}, 0x8000) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) faccessat2(r0, &(0x7f0000000080)='./file0\x00', 0x35, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x4, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040840}, 0x8000) (async) 02:38:43 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000200)={@private0, 0x0}, &(0x7f00000002c0)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@ptr={0xf, 0x0, 0x0, 0x2, 0x4}, @var={0xa, 0x0, 0x0, 0xe, 0x3, 0x29e}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000340)=""/91, 0x38, 0x5b, 0x1, 0x1}, 0x20) r5 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x100}, @ldst={0x2, 0x2, 0x3, 0xa, 0x8, 0x6, 0x8000000000000004}], &(0x7f0000000100)='GPL\x00', 0x7ad, 0x1000, &(0x7f0000000880)=""/4096, 0x41000, 0x40, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000400)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xb, 0x3, 0x3}, 0x10, 0x16b7b, r1, 0x0, &(0x7f0000000480)=[r5, r1], 0x0, 0x10, 0x3f}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:43 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000200)={@private0, 0x0}, &(0x7f00000002c0)=0x14) (async, rerun: 32) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@ptr={0xf, 0x0, 0x0, 0x2, 0x4}, @var={0xa, 0x0, 0x0, 0xe, 0x3, 0x29e}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000340)=""/91, 0x38, 0x5b, 0x1, 0x1}, 0x20) (async, rerun: 32) r5 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x100}, @ldst={0x2, 0x2, 0x3, 0xa, 0x8, 0x6, 0x8000000000000004}], &(0x7f0000000100)='GPL\x00', 0x7ad, 0x1000, &(0x7f0000000880)=""/4096, 0x41000, 0x40, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000400)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xb, 0x3, 0x3}, 0x10, 0x16b7b, r1, 0x0, &(0x7f0000000480)=[r5, r1], 0x0, 0x10, 0x3f}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:43 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) faccessat2(r0, &(0x7f0000000080)='./file0\x00', 0x35, 0x0) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x4, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040840}, 0x8000) 02:38:43 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000200)={@private0, 0x0}, &(0x7f00000002c0)=0x14) (async) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@ptr={0xf, 0x0, 0x0, 0x2, 0x4}, @var={0xa, 0x0, 0x0, 0xe, 0x3, 0x29e}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000340)=""/91, 0x38, 0x5b, 0x1, 0x1}, 0x20) (async, rerun: 32) r5 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x100}, @ldst={0x2, 0x2, 0x3, 0xa, 0x8, 0x6, 0x8000000000000004}], &(0x7f0000000100)='GPL\x00', 0x7ad, 0x1000, &(0x7f0000000880)=""/4096, 0x41000, 0x40, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000400)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xb, 0x3, 0x3}, 0x10, 0x16b7b, r1, 0x0, &(0x7f0000000480)=[r5, r1], 0x0, 0x10, 0x3f}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:43 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x10042, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x2) 02:38:43 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DMA_BUF_SET_NAME_A(r2, 0x40046201, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2020112}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x64, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x64}, 0x1, 0x0, 0x0, 0x8000}, 0x20040011) 02:38:43 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DMA_BUF_SET_NAME_A(r2, 0x40046201, 0x0) (async) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2020112}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x64, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x64}, 0x1, 0x0, 0x0, 0x8000}, 0x20040011) 02:38:44 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x10042, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x2) 02:38:44 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x10042, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x2) 02:38:44 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) (async) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DMA_BUF_SET_NAME_A(r2, 0x40046201, 0x0) (async) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2020112}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x64, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x64}, 0x1, 0x0, 0x0, 0x8000}, 0x20040011) 02:38:44 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:44 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f00000001c0)={r1, &(0x7f0000000180)=""/24}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000200)={r1, 0x10}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x4080000) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:44 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f00000001c0)={r1, &(0x7f0000000180)=""/24}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000200)={r1, 0x10}) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x4080000) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:44 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:44 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f00000001c0)={r1, &(0x7f0000000180)=""/24}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000200)={r1, 0x10}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x4080000) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)) (async) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f00000001c0)={r1, &(0x7f0000000180)=""/24}) (async) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000200)={r1, 0x10}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x4080000) (async) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 02:38:44 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0x18) 02:38:45 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x555302, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:45 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@private2, 0x0}, &(0x7f0000000040)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0x0, r0, 0x10000, '\x00', r1, 0xffffffffffffffff, 0x3, 0x7, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000180)='./file0/file0\x00', r2}, 0xfffffffffffffd07) 02:38:45 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x555302, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:45 executing program 0: openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x555302, 0x0) (async) r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x555302, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:45 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@private2, 0x0}, &(0x7f0000000040)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0x0, r0, 0x10000, '\x00', r1, 0xffffffffffffffff, 0x3, 0x7, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000180)='./file0/file0\x00', r2}, 0xfffffffffffffd07) 02:38:45 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@private2, 0x0}, &(0x7f0000000040)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0x0, r0, 0x10000, '\x00', r1, 0xffffffffffffffff, 0x3, 0x7, 0x5}, 0x48) (async, rerun: 32) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000180)='./file0/file0\x00', r2}, 0xfffffffffffffd07) 02:38:45 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = openat$userio(0xffffff9c, &(0x7f0000000000), 0x430803, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040)={0x0, 0x20}, 0x2) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:38:46 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = openat$userio(0xffffff9c, &(0x7f0000000000), 0x430803, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040)={0x0, 0x20}, 0x2) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:38:46 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r1 = openat$userio(0xffffff9c, &(0x7f0000000000), 0x430803, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040)={0x0, 0x20}, 0x2) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) openat$userio(0xffffff9c, &(0x7f0000000000), 0x430803, 0x0) (async) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040)={0x0, 0x20}, 0x2) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) (async) 02:38:46 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x101802, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:38:46 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x101802, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:38:47 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x101802, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x18) 02:38:47 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x7, 0x8300) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000440)={&(0x7f0000000400), 0xc4f31621b41a08ec}) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000480)=[0x0, 0x0, 0x0]}) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) linkat(r1, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000003c0)='./file0\x00', 0x1000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000400)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4008641c, &(0x7f0000000580)={r2, &(0x7f0000000500)=""/88}) 02:38:47 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x7, 0x8300) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000440)={&(0x7f0000000400), 0xc4f31621b41a08ec}) (async) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000480)=[0x0, 0x0, 0x0]}) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) linkat(r1, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000003c0)='./file0\x00', 0x1000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000400)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4008641c, &(0x7f0000000580)={r2, &(0x7f0000000500)=""/88}) 02:38:47 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x4000080) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000640)=[{}, {}], 0x10, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x4, &(0x7f0000000440)=@raw=[@btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffff9}], &(0x7f0000000480)='GPL\x00', 0x3, 0x95, &(0x7f00000004c0)=""/149, 0x40f00, 0x26, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000900)={0x3, 0x7, 0x5c, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000940)=[r3, r0, r1, r0, r3, r3], &(0x7f0000000980)=[{0x3, 0x3, 0x8, 0xb}, {0x4, 0x1, 0x2, 0xc}], 0x10, 0x2}, 0x90) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="23ffffdd", @ANYRES16=r4, @ANYBLOB="040025bd7000ffdbdf250100000008001900ac1e000106001c0075ce0000"], 0x24}, 0x1, 0x0, 0x0, 0x4040800}, 0x11) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000300), r3) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r6, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xc4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfc}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r3}]}, 0x64}}, 0x4040804) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)=@o_path={&(0x7f0000000040)='./file0/file0\x00', r0, 0x4000, r2}, 0xb) 02:38:47 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x7, 0x8300) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000440)={&(0x7f0000000400), 0xc4f31621b41a08ec}) (async) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000480)=[0x0, 0x0, 0x0]}) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) linkat(r1, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000003c0)='./file0\x00', 0x1000) (async) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000400)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4008641c, &(0x7f0000000580)={r2, &(0x7f0000000500)=""/88}) 02:38:47 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x4000080) (async) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, 0x0) (async) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000640)=[{}, {}], 0x10, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x4, &(0x7f0000000440)=@raw=[@btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffff9}], &(0x7f0000000480)='GPL\x00', 0x3, 0x95, &(0x7f00000004c0)=""/149, 0x40f00, 0x26, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000900)={0x3, 0x7, 0x5c, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000940)=[r3, r0, r1, r0, r3, r3], &(0x7f0000000980)=[{0x3, 0x3, 0x8, 0xb}, {0x4, 0x1, 0x2, 0xc}], 0x10, 0x2}, 0x90) (async, rerun: 64) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="23ffffdd", @ANYRES16=r4, @ANYBLOB="040025bd7000ffdbdf250100000008001900ac1e000106001c0075ce0000"], 0x24}, 0x1, 0x0, 0x0, 0x4040800}, 0x11) (async, rerun: 64) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000300), r3) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r6, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xc4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfc}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r3}]}, 0x64}}, 0x4040804) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)=@o_path={&(0x7f0000000040)='./file0/file0\x00', r0, 0x4000, r2}, 0xb) 02:38:48 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000300), 0x284002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{}, &(0x7f0000000440), &(0x7f0000000480)=r0}, 0x20) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000006c0)={@ipv4={""/10, ""/2, @remote}, 0x0}, &(0x7f0000000700)=0x14) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x3, '\x00', 0x0, r1, 0x0, 0x4, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x25, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x8001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x1, 0xa, 0x2, 0xb, 0x100, 0xfffffffffffffffc}, @map_idx={0x18, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='GPL\x00', 0x8, 0xc2, &(0x7f00000005c0)=""/194, 0x41100, 0x7, '\x00', r3, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000740)={0x4, 0x5, 0x6, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000800)=[r4], &(0x7f0000000840)=[{0x2, 0x4, 0x8000000, 0x4}, {0x4, 0x1, 0xb}, {0x4, 0x3, 0x0, 0xa}, {0x1, 0x3, 0x5, 0xa}, {0x5, 0x1, 0xe, 0x9}, {0x4, 0x1, 0x1, 0x8}, {0x4, 0x4, 0x1, 0x5}], 0x10, 0x40}, 0x90) r5 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) linkat(r5, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00', 0x1400) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)=':/^/*\\B-)\x00'], &(0x7f00000002c0)=[&(0x7f0000000180)='/dev/dlm_plock\x00', &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='%#-/\x00', &(0x7f0000000240)='--,`\'%\x00', &(0x7f0000000280)='/dev/dlm_plock\x00'], 0x100) 02:38:48 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000300), 0x284002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{}, &(0x7f0000000440), &(0x7f0000000480)=r0}, 0x20) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000006c0)={@ipv4={""/10, ""/2, @remote}, 0x0}, &(0x7f0000000700)=0x14) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x3, '\x00', 0x0, r1, 0x0, 0x4, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x25, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x8001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x1, 0xa, 0x2, 0xb, 0x100, 0xfffffffffffffffc}, @map_idx={0x18, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='GPL\x00', 0x8, 0xc2, &(0x7f00000005c0)=""/194, 0x41100, 0x7, '\x00', r3, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000740)={0x4, 0x5, 0x6, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000800)=[r4], &(0x7f0000000840)=[{0x2, 0x4, 0x8000000, 0x4}, {0x4, 0x1, 0xb}, {0x4, 0x3, 0x0, 0xa}, {0x1, 0x3, 0x5, 0xa}, {0x5, 0x1, 0xe, 0x9}, {0x4, 0x1, 0x1, 0x8}, {0x4, 0x4, 0x1, 0x5}], 0x10, 0x40}, 0x90) r5 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) linkat(r5, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00', 0x1400) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)=':/^/*\\B-)\x00'], &(0x7f00000002c0)=[&(0x7f0000000180)='/dev/dlm_plock\x00', &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='%#-/\x00', &(0x7f0000000240)='--,`\'%\x00', &(0x7f0000000280)='/dev/dlm_plock\x00'], 0x100) openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) openat$dlm_plock(0xffffff9c, &(0x7f0000000300), 0x284002, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)=r0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{}, &(0x7f0000000440), &(0x7f0000000480)=r0}, 0x20) (async) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000006c0)={@ipv4={""/10, ""/2, @remote}}, &(0x7f0000000700)=0x14) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x3, '\x00', 0x0, r1, 0x0, 0x4, 0x1}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x25, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x8001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x1, 0xa, 0x2, 0xb, 0x100, 0xfffffffffffffffc}, @map_idx={0x18, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='GPL\x00', 0x8, 0xc2, &(0x7f00000005c0)=""/194, 0x41100, 0x7, '\x00', r3, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000740)={0x4, 0x5, 0x6, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000800)=[r4], &(0x7f0000000840)=[{0x2, 0x4, 0x8000000, 0x4}, {0x4, 0x1, 0xb}, {0x4, 0x3, 0x0, 0xa}, {0x1, 0x3, 0x5, 0xa}, {0x5, 0x1, 0xe, 0x9}, {0x4, 0x1, 0x1, 0x8}, {0x4, 0x4, 0x1, 0x5}], 0x10, 0x40}, 0x90) (async) openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) (async) linkat(r5, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00', 0x1400) (async) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)=':/^/*\\B-)\x00'], &(0x7f00000002c0)=[&(0x7f0000000180)='/dev/dlm_plock\x00', &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='%#-/\x00', &(0x7f0000000240)='--,`\'%\x00', &(0x7f0000000280)='/dev/dlm_plock\x00'], 0x100) (async) 02:38:48 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x4000080) r3 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000640)=[{}, {}], 0x10, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x4, &(0x7f0000000440)=@raw=[@btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffff9}], &(0x7f0000000480)='GPL\x00', 0x3, 0x95, &(0x7f00000004c0)=""/149, 0x40f00, 0x26, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000900)={0x3, 0x7, 0x5c, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000940)=[r3, r0, r1, r0, r3, r3], &(0x7f0000000980)=[{0x3, 0x3, 0x8, 0xb}, {0x4, 0x1, 0x2, 0xc}], 0x10, 0x2}, 0x90) (async) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="23ffffdd", @ANYRES16=r4, @ANYBLOB="040025bd7000ffdbdf250100000008001900ac1e000106001c0075ce0000"], 0x24}, 0x1, 0x0, 0x0, 0x4040800}, 0x11) (async) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000300), r3) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r6, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xc4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfc}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r3}]}, 0x64}}, 0x4040804) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)=@o_path={&(0x7f0000000040)='./file0/file0\x00', r0, 0x4000, r2}, 0xb) 02:38:48 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000300), 0x284002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)=r0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{}, &(0x7f0000000440), &(0x7f0000000480)=r0}, 0x20) (async) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000006c0)={@ipv4={""/10, ""/2, @remote}, 0x0}, &(0x7f0000000700)=0x14) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x3, '\x00', 0x0, r1, 0x0, 0x4, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x25, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x8001}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x1, 0xa, 0x2, 0xb, 0x100, 0xfffffffffffffffc}, @map_idx={0x18, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000580)='GPL\x00', 0x8, 0xc2, &(0x7f00000005c0)=""/194, 0x41100, 0x7, '\x00', r3, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000740)={0x4, 0x5, 0x6, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000800)=[r4], &(0x7f0000000840)=[{0x2, 0x4, 0x8000000, 0x4}, {0x4, 0x1, 0xb}, {0x4, 0x3, 0x0, 0xa}, {0x1, 0x3, 0x5, 0xa}, {0x5, 0x1, 0xe, 0x9}, {0x4, 0x1, 0x1, 0x8}, {0x4, 0x4, 0x1, 0x5}], 0x10, 0x40}, 0x90) r5 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) linkat(r5, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00', 0x1400) (async) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)=':/^/*\\B-)\x00'], &(0x7f00000002c0)=[&(0x7f0000000180)='/dev/dlm_plock\x00', &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='%#-/\x00', &(0x7f0000000240)='--,`\'%\x00', &(0x7f0000000280)='/dev/dlm_plock\x00'], 0x100) 02:38:48 executing program 1: r0 = openat$vnet(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x200000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0x3, r1}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000180)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x3, 0x36, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_fd={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x88}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xd77}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffff8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}}, @jmp={0x5, 0x1, 0x3, 0x5, 0x3, 0x20}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], {{}, {}, {0x85, 0x0, 0x0, 0xc6}}}, &(0x7f0000000200)='syzkaller\x00', 0x200, 0x0, 0x0, 0x41100, 0x10, '\x00', r5, 0x1a, r1, 0x8, &(0x7f00000007c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0x2, 0x3, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x4, &(0x7f0000000880)=[r2, r2], &(0x7f00000008c0)=[{0x3, 0x5, 0x0, 0x7}, {0x1, 0x3, 0x2, 0x1}, {0x4, 0x2, 0x3, 0x1}, {0x1, 0x4, 0x5, 0x6}], 0x10, 0x530c}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:48 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) readlinkat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/216, 0xd8) 02:38:49 executing program 1: r0 = openat$vnet(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x200000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0x3, r1}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000180)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x3, 0x36, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_fd={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x88}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xd77}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffff8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}}, @jmp={0x5, 0x1, 0x3, 0x5, 0x3, 0x20}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], {{}, {}, {0x85, 0x0, 0x0, 0xc6}}}, &(0x7f0000000200)='syzkaller\x00', 0x200, 0x0, 0x0, 0x41100, 0x10, '\x00', r5, 0x1a, r1, 0x8, &(0x7f00000007c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0x2, 0x3, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x4, &(0x7f0000000880)=[r2, r2], &(0x7f00000008c0)=[{0x3, 0x5, 0x0, 0x7}, {0x1, 0x3, 0x2, 0x1}, {0x4, 0x2, 0x3, 0x1}, {0x1, 0x4, 0x5, 0x6}], 0x10, 0x530c}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) 02:38:49 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) readlinkat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/216, 0xd8) 02:38:49 executing program 1: r0 = openat$vnet(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x200000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0x3, r1}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000180)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x3, 0x36, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_fd={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x88}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xd77}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffff8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}}, @jmp={0x5, 0x1, 0x3, 0x5, 0x3, 0x20}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], {{}, {}, {0x85, 0x0, 0x0, 0xc6}}}, &(0x7f0000000200)='syzkaller\x00', 0x200, 0x0, 0x0, 0x41100, 0x10, '\x00', r5, 0x1a, r1, 0x8, &(0x7f00000007c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0x2, 0x3, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x4, &(0x7f0000000880)=[r2, r2], &(0x7f00000008c0)=[{0x3, 0x5, 0x0, 0x7}, {0x1, 0x3, 0x2, 0x1}, {0x4, 0x2, 0x3, 0x1}, {0x1, 0x4, 0x5, 0x6}], 0x10, 0x530c}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) openat$vnet(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x200000, 0x0) (async) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0x3, r1}) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2}, 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f0000000100), &(0x7f0000000180)=r1}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x3, 0x36, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_fd={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x88}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xd77}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffff8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}}, @jmp={0x5, 0x1, 0x3, 0x5, 0x3, 0x20}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], {{}, {}, {0x85, 0x0, 0x0, 0xc6}}}, &(0x7f0000000200)='syzkaller\x00', 0x200, 0x0, 0x0, 0x41100, 0x10, '\x00', r5, 0x1a, r1, 0x8, &(0x7f00000007c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0x2, 0x3, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x4, &(0x7f0000000880)=[r2, r2], &(0x7f00000008c0)=[{0x3, 0x5, 0x0, 0x7}, {0x1, 0x3, 0x2, 0x1}, {0x4, 0x2, 0x3, 0x1}, {0x1, 0x4, 0x5, 0x6}], 0x10, 0x530c}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r3}, 0x18) (async) 02:38:49 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) (async) readlinkat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/216, 0xd8) 02:38:49 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@empty, 0x0}, &(0x7f0000000180)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x9, [@int={0xb, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, 0x21, 0x7}, @restrict={0xf}, @enum={0xe, 0x2, 0x0, 0x6, 0x4, [{0xa, 0x2}, {0xe, 0x400}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x0, 0x1f, [{0x6, 0x4, 0x3f}, {0x2, 0x2, 0x2}, {0x2, 0x4, 0xff}, {0x0, 0x1, 0x3}, {0x10, 0x1, 0x5}, {0xc, 0x1, 0xfffffffa}, {0x3, 0x1, 0x4}]}]}, {0x0, [0x0, 0x61, 0x5f, 0x30, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000640)=""/84, 0xb9, 0x54, 0x0, 0x6}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x401, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x15, 0x5, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, [@alu={0x7, 0x1, 0x9, 0x3, 0xa, 0x7fffffffffffffec, 0x1b}, @generic={0x1f, 0x5, 0xc, 0x3dd0, 0x8}]}, &(0x7f0000000500)='GPL\x00', 0x8, 0x25, &(0x7f0000000540)=""/37, 0x41100, 0x20, '\x00', r2, 0x36, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x2, 0xf, 0x1, 0x2}, 0x10, r4, 0xffffffffffffffff, 0x7, &(0x7f0000000780)=[r0, r0, r0, r0], &(0x7f00000007c0)=[{0x2, 0x5, 0xf, 0x3}, {0x4, 0x3, 0x2}, {0x5, 0x3, 0x2, 0x2}, {0x5, 0x5, 0xf, 0x775326cec32364c3}, {0x2, 0x3, 0x8, 0x4}, {0x0, 0x4, 0xd, 0x7}, {0x3, 0x2, 0x0, 0xa}], 0x10, 0xdb}, 0x90) r5 = openat$dlm_plock(0xffffff9c, &(0x7f00000001c0), 0x1, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0xf2, 0x10}, 0xc) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x8, &(0x7f0000000000)=@raw=[@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8001}}], &(0x7f0000000040)='GPL\x00', 0x7fff, 0x2e, &(0x7f00000000c0)=""/46, 0x41100, 0x8, '\x00', r2, 0x25, r5, 0x8, &(0x7f0000000200)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x5, 0x800, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r1, 0x1, r6, r7, r0], 0x0, 0x10, 0x5}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0xfffffed6) 02:38:49 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x14, r3, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x24}}, 0x20000000) 02:38:49 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@empty, 0x0}, &(0x7f0000000180)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x9, [@int={0xb, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, 0x21, 0x7}, @restrict={0xf}, @enum={0xe, 0x2, 0x0, 0x6, 0x4, [{0xa, 0x2}, {0xe, 0x400}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x0, 0x1f, [{0x6, 0x4, 0x3f}, {0x2, 0x2, 0x2}, {0x2, 0x4, 0xff}, {0x0, 0x1, 0x3}, {0x10, 0x1, 0x5}, {0xc, 0x1, 0xfffffffa}, {0x3, 0x1, 0x4}]}]}, {0x0, [0x0, 0x61, 0x5f, 0x30, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000640)=""/84, 0xb9, 0x54, 0x0, 0x6}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x401, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x15, 0x5, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, [@alu={0x7, 0x1, 0x9, 0x3, 0xa, 0x7fffffffffffffec, 0x1b}, @generic={0x1f, 0x5, 0xc, 0x3dd0, 0x8}]}, &(0x7f0000000500)='GPL\x00', 0x8, 0x25, &(0x7f0000000540)=""/37, 0x41100, 0x20, '\x00', r2, 0x36, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x2, 0xf, 0x1, 0x2}, 0x10, r4, 0xffffffffffffffff, 0x7, &(0x7f0000000780)=[r0, r0, r0, r0], &(0x7f00000007c0)=[{0x2, 0x5, 0xf, 0x3}, {0x4, 0x3, 0x2}, {0x5, 0x3, 0x2, 0x2}, {0x5, 0x5, 0xf, 0x775326cec32364c3}, {0x2, 0x3, 0x8, 0x4}, {0x0, 0x4, 0xd, 0x7}, {0x3, 0x2, 0x0, 0xa}], 0x10, 0xdb}, 0x90) r5 = openat$dlm_plock(0xffffff9c, &(0x7f00000001c0), 0x1, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0xf2, 0x10}, 0xc) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x8, &(0x7f0000000000)=@raw=[@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8001}}], &(0x7f0000000040)='GPL\x00', 0x7fff, 0x2e, &(0x7f00000000c0)=""/46, 0x41100, 0x8, '\x00', r2, 0x25, r5, 0x8, &(0x7f0000000200)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x5, 0x800, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r1, 0x1, r6, r7, r0], 0x0, 0x10, 0x5}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0xfffffed6) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0}, 0x4) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@empty}, &(0x7f0000000180)=0x14) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x9, [@int={0xb, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, 0x21, 0x7}, @restrict={0xf}, @enum={0xe, 0x2, 0x0, 0x6, 0x4, [{0xa, 0x2}, {0xe, 0x400}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x0, 0x1f, [{0x6, 0x4, 0x3f}, {0x2, 0x2, 0x2}, {0x2, 0x4, 0xff}, {0x0, 0x1, 0x3}, {0x10, 0x1, 0x5}, {0xc, 0x1, 0xfffffffa}, {0x3, 0x1, 0x4}]}]}, {0x0, [0x0, 0x61, 0x5f, 0x30, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000640)=""/84, 0xb9, 0x54, 0x0, 0x6}, 0x20) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x401}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x15, 0x5, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, [@alu={0x7, 0x1, 0x9, 0x3, 0xa, 0x7fffffffffffffec, 0x1b}, @generic={0x1f, 0x5, 0xc, 0x3dd0, 0x8}]}, &(0x7f0000000500)='GPL\x00', 0x8, 0x25, &(0x7f0000000540)=""/37, 0x41100, 0x20, '\x00', r2, 0x36, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x2, 0xf, 0x1, 0x2}, 0x10, r4, 0xffffffffffffffff, 0x7, &(0x7f0000000780)=[r0, r0, r0, r0], &(0x7f00000007c0)=[{0x2, 0x5, 0xf, 0x3}, {0x4, 0x3, 0x2}, {0x5, 0x3, 0x2, 0x2}, {0x5, 0x5, 0xf, 0x775326cec32364c3}, {0x2, 0x3, 0x8, 0x4}, {0x0, 0x4, 0xd, 0x7}, {0x3, 0x2, 0x0, 0xa}], 0x10, 0xdb}, 0x90) (async) openat$dlm_plock(0xffffff9c, &(0x7f00000001c0), 0x1, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0xf2, 0x10}, 0xc) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x8, &(0x7f0000000000)=@raw=[@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8001}}], &(0x7f0000000040)='GPL\x00', 0x7fff, 0x2e, &(0x7f00000000c0)=""/46, 0x41100, 0x8, '\x00', r2, 0x25, r5, 0x8, &(0x7f0000000200)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x5, 0x800, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r1, 0x1, r6, r7, r0], 0x0, 0x10, 0x5}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0xfffffed6) (async) 02:38:49 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x14, r3, 0x1}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x14, r3, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x24}}, 0x20000000) 02:38:50 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@empty, 0x0}, &(0x7f0000000180)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x9, [@int={0xb, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, 0x21, 0x7}, @restrict={0xf}, @enum={0xe, 0x2, 0x0, 0x6, 0x4, [{0xa, 0x2}, {0xe, 0x400}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x0, 0x1f, [{0x6, 0x4, 0x3f}, {0x2, 0x2, 0x2}, {0x2, 0x4, 0xff}, {0x0, 0x1, 0x3}, {0x10, 0x1, 0x5}, {0xc, 0x1, 0xfffffffa}, {0x3, 0x1, 0x4}]}]}, {0x0, [0x0, 0x61, 0x5f, 0x30, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000640)=""/84, 0xb9, 0x54, 0x0, 0x6}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x401, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x15, 0x5, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, [@alu={0x7, 0x1, 0x9, 0x3, 0xa, 0x7fffffffffffffec, 0x1b}, @generic={0x1f, 0x5, 0xc, 0x3dd0, 0x8}]}, &(0x7f0000000500)='GPL\x00', 0x8, 0x25, &(0x7f0000000540)=""/37, 0x41100, 0x20, '\x00', r2, 0x36, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x2, 0xf, 0x1, 0x2}, 0x10, r4, 0xffffffffffffffff, 0x7, &(0x7f0000000780)=[r0, r0, r0, r0], &(0x7f00000007c0)=[{0x2, 0x5, 0xf, 0x3}, {0x4, 0x3, 0x2}, {0x5, 0x3, 0x2, 0x2}, {0x5, 0x5, 0xf, 0x775326cec32364c3}, {0x2, 0x3, 0x8, 0x4}, {0x0, 0x4, 0xd, 0x7}, {0x3, 0x2, 0x0, 0xa}], 0x10, 0xdb}, 0x90) openat$dlm_plock(0xffffff9c, &(0x7f00000001c0), 0x1, 0x0) (async) r5 = openat$dlm_plock(0xffffff9c, &(0x7f00000001c0), 0x1, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0xf2, 0x10}, 0xc) (async) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0xf2, 0x10}, 0xc) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x8, &(0x7f0000000000)=@raw=[@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8001}}], &(0x7f0000000040)='GPL\x00', 0x7fff, 0x2e, &(0x7f00000000c0)=""/46, 0x41100, 0x8, '\x00', r2, 0x25, r5, 0x8, &(0x7f0000000200)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x5, 0x800, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r1, 0x1, r6, r7, r0], 0x0, 0x10, 0x5}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r1}, 0xfffffed6) 02:38:50 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x14, r3, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x24}}, 0x20000000) 02:38:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), r0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x6c, r1, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dvmrp0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'gre0\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x24002850}, 0x1) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) r5 = openat$iommufd(0xffffff9c, &(0x7f00000000c0), 0x4201, 0x0) ioctl$IOMMU_VFIO_IOAS$GET(r5, 0x3b88, &(0x7f0000000100)={0xc}) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r6, 0x4008641c, 0x0) ioctl$IOMMU_VFIO_IOAS$GET(0xffffffffffffffff, 0x3b88, &(0x7f0000000340)={0xc, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r6, 0x3ba0, &(0x7f0000000380)={0x38, 0x2, r7}) 02:38:50 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, r2, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2={0xfc, 0x2, '\x00', 0x1}}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xae}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xde}]}, 0x80}, 0x1, 0x0, 0x0, 0x14}, 0x10) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), r0) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x6c, r1, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dvmrp0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'gre0\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x24002850}, 0x1) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) (async) r5 = openat$iommufd(0xffffff9c, &(0x7f00000000c0), 0x4201, 0x0) ioctl$IOMMU_VFIO_IOAS$GET(r5, 0x3b88, &(0x7f0000000100)={0xc}) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) (async) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r6, 0x4008641c, 0x0) (async) ioctl$IOMMU_VFIO_IOAS$GET(0xffffffffffffffff, 0x3b88, &(0x7f0000000340)={0xc, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r6, 0x3ba0, &(0x7f0000000380)={0x38, 0x2, r7}) 02:38:51 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, r2, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2={0xfc, 0x2, '\x00', 0x1}}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xae}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xde}]}, 0x80}, 0x1, 0x0, 0x0, 0x14}, 0x10) (async) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), r0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x6c, r1, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dvmrp0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'gre0\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x24002850}, 0x1) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r2, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000140)='./file0/file0\x00', r4}, 0x18) (async) r5 = openat$iommufd(0xffffff9c, &(0x7f00000000c0), 0x4201, 0x0) ioctl$IOMMU_VFIO_IOAS$GET(r5, 0x3b88, &(0x7f0000000100)={0xc}) (async) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) (async) r6 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r6, 0x4008641c, 0x0) (async, rerun: 32) ioctl$IOMMU_VFIO_IOAS$GET(0xffffffffffffffff, 0x3b88, &(0x7f0000000340)={0xc, 0x0}) (rerun: 32) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r6, 0x3ba0, &(0x7f0000000380)={0x38, 0x2, r7}) 02:38:51 executing program 0: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async, rerun: 32) clock_gettime(0x0, &(0x7f0000000240)) (rerun: 32) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, r2, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2={0xfc, 0x2, '\x00', 0x1}}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xae}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xde}]}, 0x80}, 0x1, 0x0, 0x0, 0x14}, 0x10) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:51 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$dir(0xffffff9c, &(0x7f00000001c0)='./file0\x00', 0x42, 0xa) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) 02:38:51 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$dir(0xffffff9c, &(0x7f00000001c0)='./file0\x00', 0x42, 0xa) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) [ 9532.047252][ T30] INFO: task kworker/1:0:17618 blocked for more than 430 seconds. [ 9532.047735][ T30] Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.048090][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9532.048566][ T30] task:kworker/1:0 state:D stack:0 pid:17618 tgid:17618 ppid:2 flags:0x00000000 [ 9532.049411][ T30] Workqueue: events bpf_prog_free_deferred [ 9532.049876][ T30] Backtrace: [ 9532.050053][ T30] [<81856d84>] (__schedule) from [<818579bc>] (schedule+0x2c/0xb8) [ 9532.050425][ T30] r10:82c16205 r9:00000000 r8:8270dd78 r7:00000002 r6:ee2e1dac r5:84744800 [ 9532.050720][ T30] r4:84744800 [ 9532.050903][ T30] [<81857990>] (schedule) from [<81857f88>] (schedule_preempt_disabled+0x18/0x24) [ 9532.051431][ T30] r5:84744800 r4:8270dd74 [ 9532.051617][ T30] [<81857f70>] (schedule_preempt_disabled) from [<8185a870>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 9532.052229][ T30] [<8185a588>] (__mutex_lock.constprop.0) from [<8185b13c>] (__mutex_lock_slowpath+0x14/0x18) [ 9532.052924][ T30] r10:82c16205 r9:ee2e1e38 r8:00000000 r7:ffffffff r6:00000000 r5:857ff9c0 [ 9532.053266][ T30] r4:00000000 [ 9532.053435][ T30] [<8185b128>] (__mutex_lock_slowpath) from [<8185b17c>] (mutex_lock+0x3c/0x40) [ 9532.053994][ T30] [<8185b140>] (mutex_lock) from [<8048dda4>] (_vm_unmap_aliases+0x60/0x2e4) [ 9532.054354][ T30] [<8048dd44>] (_vm_unmap_aliases) from [<80491944>] (vfree+0x170/0x1e0) 02:38:51 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$dir(0xffffff9c, &(0x7f00000001c0)='./file0\x00', 0x42, 0xa) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) [ 9532.054767][ T30] r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ff9c0 [ 9532.081046][ T30] r4:00000000 [ 9532.081187][ T30] [<804917d4>] (vfree) from [<802ea330>] (module_memfree+0x30/0x50) [ 9532.081533][ T30] r9:84744800 r8:00000080 r7:00000000 r6:82c16200 r5:00001000 r4:7f10f000 [ 9532.081796][ T30] [<802ea300>] (module_memfree) from [<8038898c>] (bpf_jit_free_exec+0x10/0x14) [ 9532.082430][ T30] r5:00001000 r4:dff43000 [ 9532.082691][ T30] [<8038897c>] (bpf_jit_free_exec) from [<80388b4c>] (bpf_jit_free+0x68/0xe4) [ 9532.083214][ T30] [<80388ae4>] (bpf_jit_free) from [<80389c2c>] (bpf_prog_free_deferred+0x14c/0x164) [ 9532.091557][ T30] r5:857e0350 r4:857e0000 [ 9532.091832][ T30] [<80389ae0>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 9532.092372][ T30] r7:ddde4280 r6:82c16200 r5:857e0350 r4:85855f00 [ 9532.092690][ T30] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 9532.093047][ T30] r10:61c88647 r9:84744800 r8:ddde42a0 r7:82604d40 r6:ddde4280 r5:85855f2c [ 9532.093392][ T30] r4:85855f00 [ 9532.093556][ T30] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 9532.093976][ T30] r10:00000000 r9:ed325e90 r8:85dd74c0 r7:85855f00 r6:8026736c r5:84744800 [ 9532.094283][ T30] r4:85875900 [ 9532.094396][ T30] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 9532.103052][ T30] Exception stack(0xee2e1fb0 to 0xee2e1ff8) [ 9532.103500][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 9532.103845][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9532.104150][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9532.104557][ T30] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:85875900 [ 9532.114241][ T30] INFO: task kworker/1:4:28865 blocked for more than 430 seconds. [ 9532.114783][ T30] Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.115451][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9532.115713][ T30] task:kworker/1:4 state:D stack:0 pid:28865 tgid:28865 ppid:2 flags:0x00000000 [ 9532.116079][ T30] Workqueue: events bpf_prog_free_deferred [ 9532.116300][ T30] Backtrace: [ 9532.116566][ T30] [<81856d84>] (__schedule) from [<818579bc>] (schedule+0x2c/0xb8) [ 9532.116825][ T30] r10:82c16205 r9:00000000 r8:8270dd78 r7:00000002 r6:eacb5dac r5:84d88000 [ 9532.125667][ T30] r4:84d88000 [ 9532.125994][ T30] [<81857990>] (schedule) from [<81857f88>] (schedule_preempt_disabled+0x18/0x24) [ 9532.126349][ T30] r5:84d88000 r4:8270dd74 [ 9532.126612][ T30] [<81857f70>] (schedule_preempt_disabled) from [<8185a870>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 9532.126940][ T30] [<8185a588>] (__mutex_lock.constprop.0) from [<8185b13c>] (__mutex_lock_slowpath+0x14/0x18) [ 9532.127645][ T30] r10:82c16205 r9:eacb5e38 r8:00000000 r7:ffffffff r6:00000000 r5:850f5e00 [ 9532.128115][ T30] r4:00000000 [ 9532.128229][ T30] [<8185b128>] (__mutex_lock_slowpath) from [<8185b17c>] (mutex_lock+0x3c/0x40) [ 9532.135288][ T30] [<8185b140>] (mutex_lock) from [<8048dda4>] (_vm_unmap_aliases+0x60/0x2e4) [ 9532.135889][ T30] [<8048dd44>] (_vm_unmap_aliases) from [<80491944>] (vfree+0x170/0x1e0) [ 9532.136428][ T30] r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f5e00 [ 9532.136691][ T30] r4:00000000 [ 9532.136842][ T30] [<804917d4>] (vfree) from [<802ea330>] (module_memfree+0x30/0x50) [ 9532.137504][ T30] r9:84d88000 r8:00000080 r7:00000000 r6:82c16200 r5:00001000 r4:7f03b000 [ 9532.137998][ T30] [<802ea300>] (module_memfree) from [<8038898c>] (bpf_jit_free_exec+0x10/0x14) [ 9532.138574][ T30] r5:00001000 r4:eaccb000 [ 9532.138713][ T30] [<8038897c>] (bpf_jit_free_exec) from [<80388b4c>] (bpf_jit_free+0x68/0xe4) [ 9532.138972][ T30] [<80388ae4>] (bpf_jit_free) from [<80389c2c>] (bpf_prog_free_deferred+0x14c/0x164) [ 9532.139428][ T30] r5:857e3350 r4:857e3000 [ 9532.139567][ T30] [<80389ae0>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 9532.140104][ T30] r7:ddde4280 r6:82c16200 r5:857e3350 r4:850cb880 [ 9532.140376][ T30] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 9532.140790][ T30] r10:61c88647 r9:84d88000 r8:ddde42a0 r7:82604d40 r6:ddde4280 r5:850cb8ac [ 9532.141012][ T30] r4:850cb880 [ 9532.141183][ T30] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 9532.141543][ T30] r10:00000000 r9:e078de90 r8:8585d980 r7:850cb880 r6:8026736c r5:84d88000 [ 9532.141951][ T30] r4:8585d300 [ 9532.142179][ T30] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 9532.142642][ T30] Exception stack(0xeacb5fb0 to 0xeacb5ff8) [ 9532.142837][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 9532.143370][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9532.143904][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9532.144208][ T30] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:8585d300 [ 9532.144735][ T30] INFO: task kworker/1:18:11816 blocked for more than 430 seconds. [ 9532.166766][ T30] Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.167184][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9532.167597][ T30] task:kworker/1:18 state:D stack:0 pid:11816 tgid:11816 ppid:2 flags:0x00000000 [ 9532.170081][ T30] Workqueue: events bpf_prog_free_deferred [ 9532.170638][ T30] Backtrace: [ 9532.170928][ T30] [<81856d84>] (__schedule) from [<818579bc>] (schedule+0x2c/0xb8) [ 9532.175774][ T30] r10:82c16205 r9:00000000 r8:8270dd78 r7:00000002 r6:dfd85dac r5:8512c800 [ 9532.176454][ T30] r4:8512c800 [ 9532.176577][ T30] [<81857990>] (schedule) from [<81857f88>] (schedule_preempt_disabled+0x18/0x24) [ 9532.177087][ T30] r5:8512c800 r4:8270dd74 [ 9532.177240][ T30] [<81857f70>] (schedule_preempt_disabled) from [<8185a870>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 9532.177544][ T30] [<8185a588>] (__mutex_lock.constprop.0) from [<8185b13c>] (__mutex_lock_slowpath+0x14/0x18) [ 9532.178095][ T30] r10:82c16205 r9:dfd85e38 r8:00000000 r7:ffffffff r6:00000000 r5:847ab440 [ 9532.178490][ T30] r4:00000000 [ 9532.198392][ T30] [<8185b128>] (__mutex_lock_slowpath) from [<8185b17c>] (mutex_lock+0x3c/0x40) [ 9532.199278][ T30] [<8185b140>] (mutex_lock) from [<8048dda4>] (_vm_unmap_aliases+0x60/0x2e4) [ 9532.199531][ T30] [<8048dd44>] (_vm_unmap_aliases) from [<80491944>] (vfree+0x170/0x1e0) [ 9532.199985][ T30] r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ab440 [ 9532.200468][ T30] r4:00000000 [ 9532.200695][ T30] [<804917d4>] (vfree) from [<802ea330>] (module_memfree+0x30/0x50) [ 9532.201010][ T30] r9:8512c800 r8:00000080 r7:00000000 r6:82c16200 r5:00001000 r4:7f0c5000 [ 9532.201225][ T30] [<802ea300>] (module_memfree) from [<8038898c>] (bpf_jit_free_exec+0x10/0x14) [ 9532.201490][ T30] r5:00001000 r4:eacb7000 [ 9532.201773][ T30] [<8038897c>] (bpf_jit_free_exec) from [<80388b4c>] (bpf_jit_free+0x68/0xe4) [ 9532.202564][ T30] [<80388ae4>] (bpf_jit_free) from [<80389c2c>] (bpf_prog_free_deferred+0x14c/0x164) [ 9532.203315][ T30] r5:8f473b50 r4:8f473800 [ 9532.203489][ T30] [<80389ae0>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 9532.204086][ T30] r7:ddde4280 r6:82c16200 r5:8f473b50 r4:85191b00 [ 9532.204500][ T30] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 9532.223749][ T30] r10:61c88647 r9:8512c800 r8:ddde42a0 r7:82604d40 r6:ddde4280 r5:85191b2c [ 9532.224153][ T30] r4:85191b00 [ 9532.224298][ T30] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 9532.233320][ T30] r10:00000000 r9:dfc49e90 r8:95241900 r7:85191b00 r6:8026736c r5:8512c800 [ 9532.233695][ T30] r4:952411c0 [ 9532.233826][ T30] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 9532.234113][ T30] Exception stack(0xdfd85fb0 to 0xdfd85ff8) [ 9532.234480][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 9532.236130][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9532.236672][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9532.236923][ T30] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:952411c0 [ 9532.238036][ T30] INFO: task kworker/1:21:11861 blocked for more than 430 seconds. [ 9532.238357][ T30] Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.238797][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9532.252527][ T30] task:kworker/1:21 state:D stack:0 pid:11861 tgid:11861 ppid:2 flags:0x00000000 [ 9532.253565][ T30] Workqueue: events bpf_prog_free_deferred [ 9532.253971][ T30] Backtrace: [ 9532.254110][ T30] [<81856d84>] (__schedule) from [<818579bc>] (schedule+0x2c/0xb8) [ 9532.254673][ T30] r10:82c16205 r9:00000000 r8:8270dd78 r7:00000002 r6:df839dac r5:83605400 [ 9532.257817][ T30] r4:83605400 [ 9532.258221][ T30] [<81857990>] (schedule) from [<81857f88>] (schedule_preempt_disabled+0x18/0x24) [ 9532.258695][ T30] r5:83605400 r4:8270dd74 [ 9532.264317][ T30] [<81857f70>] (schedule_preempt_disabled) from [<8185a870>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 9532.266436][ T30] [<8185a588>] (__mutex_lock.constprop.0) from [<8185b13c>] (__mutex_lock_slowpath+0x14/0x18) [ 9532.267216][ T30] r10:82c16205 r9:df839e38 r8:00000000 r7:ffffffff r6:00000000 r5:87879c00 [ 9532.269436][ T30] r4:00000000 [ 9532.269738][ T30] [<8185b128>] (__mutex_lock_slowpath) from [<8185b17c>] (mutex_lock+0x3c/0x40) [ 9532.270159][ T30] [<8185b140>] (mutex_lock) from [<8048dda4>] (_vm_unmap_aliases+0x60/0x2e4) [ 9532.270856][ T30] [<8048dd44>] (_vm_unmap_aliases) from [<80491944>] (vfree+0x170/0x1e0) [ 9532.271379][ T30] r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87879c00 [ 9532.271855][ T30] r4:00000000 [ 9532.272081][ T30] [<804917d4>] (vfree) from [<802ea330>] (module_memfree+0x30/0x50) [ 9532.276558][ T30] r9:83605400 r8:00000080 r7:00000000 r6:82c16200 r5:00001000 r4:7f113000 [ 9532.276970][ T30] [<802ea300>] (module_memfree) from [<8038898c>] (bpf_jit_free_exec+0x10/0x14) [ 9532.279764][ T30] r5:00001000 r4:dff85000 [ 9532.279901][ T30] [<8038897c>] (bpf_jit_free_exec) from [<80388b4c>] (bpf_jit_free+0x68/0xe4) [ 9532.282971][ T30] [<80388ae4>] (bpf_jit_free) from [<80389c2c>] (bpf_prog_free_deferred+0x14c/0x164) [ 9532.283751][ T30] r5:9489d750 r4:9489d400 [ 9532.283898][ T30] [<80389ae0>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 9532.286693][ T30] r7:ddde4280 r6:82c16200 r5:9489d750 r4:851c4e00 [ 9532.289795][ T30] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 9532.290458][ T30] r10:61c88647 r9:83605400 r8:ddde42a0 r7:82604d40 r6:ddde4280 r5:851c4e2c [ 9532.290816][ T30] r4:851c4e00 [ 9532.290974][ T30] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 9532.291678][ T30] r10:00000000 r9:dfeb1e90 r8:a744f280 r7:851c4e00 r6:8026736c r5:83605400 [ 9532.292030][ T30] r4:85096580 [ 9532.292139][ T30] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 9532.292662][ T30] Exception stack(0xdf839fb0 to 0xdf839ff8) [ 9532.297798][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 9532.298170][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9532.298425][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9532.302965][ T30] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:85096580 [ 9532.303614][ T30] INFO: task kworker/0:39:11939 blocked for more than 430 seconds. [ 9532.309254][ T30] Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.309573][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9532.309977][ T30] task:kworker/0:39 state:D stack:0 pid:11939 tgid:11939 ppid:2 flags:0x00000000 [ 9532.310511][ T30] Workqueue: events bpf_prog_free_deferred [ 9532.310850][ T30] Backtrace: [ 9532.311007][ T30] [<81856d84>] (__schedule) from [<818579bc>] (schedule+0x2c/0xb8) [ 9532.311454][ T30] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:e0adddac r5:84d8c800 [ 9532.311857][ T30] r4:84d8c800 [ 9532.312060][ T30] [<81857990>] (schedule) from [<81857f88>] (schedule_preempt_disabled+0x18/0x24) [ 9532.312436][ T30] r5:84d8c800 r4:8270dd74 [ 9532.312698][ T30] [<81857f70>] (schedule_preempt_disabled) from [<8185a870>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 9532.312982][ T30] [<8185a588>] (__mutex_lock.constprop.0) from [<8185b13c>] (__mutex_lock_slowpath+0x14/0x18) [ 9532.313468][ T30] r10:82c16005 r9:e0adde38 r8:00000000 r7:ffffffff r6:00000000 r5:a443ea40 [ 9532.313701][ T30] r4:00000000 [ 9532.313930][ T30] [<8185b128>] (__mutex_lock_slowpath) from [<8185b17c>] (mutex_lock+0x3c/0x40) [ 9532.314231][ T30] [<8185b140>] (mutex_lock) from [<8048dda4>] (_vm_unmap_aliases+0x60/0x2e4) [ 9532.314663][ T30] [<8048dd44>] (_vm_unmap_aliases) from [<80491944>] (vfree+0x170/0x1e0) [ 9532.322964][ T30] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:a443ea40 [ 9532.323660][ T30] r4:00000000 [ 9532.327037][ T30] [<804917d4>] (vfree) from [<802ea330>] (module_memfree+0x30/0x50) [ 9532.327516][ T30] r9:84d8c800 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f08f000 [ 9532.327751][ T30] [<802ea300>] (module_memfree) from [<8038898c>] (bpf_jit_free_exec+0x10/0x14) [ 9532.330401][ T30] r5:00001000 r4:e0937000 [ 9532.330665][ T30] [<8038897c>] (bpf_jit_free_exec) from [<80388b4c>] (bpf_jit_free+0x68/0xe4) [ 9532.333247][ T30] [<80388ae4>] (bpf_jit_free) from [<80389c2c>] (bpf_prog_free_deferred+0x14c/0x164) [ 9532.333678][ T30] r5:85a8bb50 r4:85a8b800 [ 9532.333824][ T30] [<80389ae0>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 9532.334129][ T30] r7:dddd1280 r6:82c16000 r5:85a8bb50 r4:85611400 [ 9532.337054][ T30] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 9532.337634][ T30] r10:61c88647 r9:84d8c800 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:8561142c [ 9532.337946][ T30] r4:85611400 [ 9532.338108][ T30] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 9532.342865][ T30] r10:00000000 r9:e0a95e90 r8:98c2f3c0 r7:85611400 r6:8026736c r5:84d8c800 [ 9532.343278][ T30] r4:98c2f240 [ 9532.343605][ T30] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 9532.344298][ T30] Exception stack(0xe0addfb0 to 0xe0addff8) [ 9532.344601][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 9532.349204][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9532.349792][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9532.350068][ T30] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:98c2f240 [ 9532.350449][ T30] INFO: task kworker/0:40:11941 blocked for more than 430 seconds. [ 9532.351062][ T30] Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.351355][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9532.351740][ T30] task:kworker/0:40 state:D stack:0 pid:11941 tgid:11941 ppid:2 flags:0x00000000 [ 9532.352092][ T30] Workqueue: events bpf_prog_free_deferred [ 9532.360290][ T30] Backtrace: [ 9532.360542][ T30] [<81856d84>] (__schedule) from [<818579bc>] (schedule+0x2c/0xb8) [ 9532.362985][ T30] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:e0ae1dac r5:84d8d400 [ 9532.363735][ T30] r4:84d8d400 [ 9532.363930][ T30] [<81857990>] (schedule) from [<81857f88>] (schedule_preempt_disabled+0x18/0x24) [ 9532.364347][ T30] r5:84d8d400 r4:8270dd74 [ 9532.364666][ T30] [<81857f70>] (schedule_preempt_disabled) from [<8185a870>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 9532.379217][ T30] [<8185a588>] (__mutex_lock.constprop.0) from [<8185b13c>] (__mutex_lock_slowpath+0x14/0x18) [ 9532.379777][ T30] r10:82c16005 r9:e0ae1e38 r8:00000000 r7:ffffffff r6:00000000 r5:a443e900 [ 9532.380008][ T30] r4:00000000 [ 9532.380219][ T30] [<8185b128>] (__mutex_lock_slowpath) from [<8185b17c>] (mutex_lock+0x3c/0x40) [ 9532.380682][ T30] [<8185b140>] (mutex_lock) from [<8048dda4>] (_vm_unmap_aliases+0x60/0x2e4) [ 9532.381145][ T30] [<8048dd44>] (_vm_unmap_aliases) from [<80491944>] (vfree+0x170/0x1e0) [ 9532.381585][ T30] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:a443e900 02:38:52 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) [ 9532.395577][ T30] r4:00000000 [ 9532.395937][ T30] [<804917d4>] (vfree) from [<802ea330>] (module_memfree+0x30/0x50) [ 9532.396618][ T30] r9:84d8d400 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f08d000 [ 9532.397099][ T30] [<802ea300>] (module_memfree) from [<8038898c>] (bpf_jit_free_exec+0x10/0x14) [ 9532.397563][ T30] r5:00001000 r4:e092d000 [ 9532.404166][ T30] [<8038897c>] (bpf_jit_free_exec) from [<80388b4c>] (bpf_jit_free+0x68/0xe4) [ 9532.405419][ T30] [<80388ae4>] (bpf_jit_free) from [<80389c2c>] (bpf_prog_free_deferred+0x14c/0x164) [ 9532.405864][ T30] r5:85a8b750 r4:85a8b400 [ 9532.406122][ T30] [<80389ae0>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 9532.406523][ T30] r7:dddd1280 r6:82c16000 r5:85a8b750 r4:85611280 [ 9532.407157][ T30] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 9532.407981][ T30] r10:61c88647 r9:84d8d400 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:856112ac [ 9532.419554][ T30] r4:85611280 [ 9532.419897][ T30] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 9532.420495][ T30] r10:00000000 r9:e0adde90 r8:98c2f500 r7:85611280 r6:8026736c r5:84d8d400 [ 9532.421012][ T30] r4:98c2f240 [ 9532.421129][ T30] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 9532.421551][ T30] Exception stack(0xe0ae1fb0 to 0xe0ae1ff8) [ 9532.421849][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 9532.422358][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9532.432761][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9532.433130][ T30] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:98c2f240 [ 9532.433376][ T30] INFO: task kworker/0:41:11942 blocked for more than 430 seconds. [ 9532.433603][ T30] Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.433745][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9532.434254][ T30] task:kworker/0:41 state:D stack:0 pid:11942 tgid:11942 ppid:2 flags:0x00000000 [ 9532.434637][ T30] Workqueue: events bpf_prog_free_deferred [ 9532.434880][ T30] Backtrace: [ 9532.435027][ T30] [<81856d84>] (__schedule) from [<818579bc>] (schedule+0x2c/0xb8) [ 9532.435326][ T30] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:e0b01dac r5:83ee9800 [ 9532.435569][ T30] r4:83ee9800 [ 9532.435704][ T30] [<81857990>] (schedule) from [<81857f88>] (schedule_preempt_disabled+0x18/0x24) [ 9532.435982][ T30] r5:83ee9800 r4:8270dd74 [ 9532.436122][ T30] [<81857f70>] (schedule_preempt_disabled) from [<8185a870>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 9532.436396][ T30] [<8185a588>] (__mutex_lock.constprop.0) from [<8185b13c>] (__mutex_lock_slowpath+0x14/0x18) [ 9532.444780][ T30] r10:82c16005 r9:e0b01e38 r8:00000000 r7:ffffffff r6:00000000 r5:a443e680 [ 9532.445669][ T30] r4:00000000 [ 9532.445997][ T30] [<8185b128>] (__mutex_lock_slowpath) from [<8185b17c>] (mutex_lock+0x3c/0x40) [ 9532.446289][ T30] [<8185b140>] (mutex_lock) from [<8048dda4>] (_vm_unmap_aliases+0x60/0x2e4) [ 9532.446769][ T30] [<8048dd44>] (_vm_unmap_aliases) from [<80491944>] (vfree+0x170/0x1e0) [ 9532.447263][ T30] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:a443e680 [ 9532.447674][ T30] r4:00000000 [ 9532.459717][ T30] [<804917d4>] (vfree) from [<802ea330>] (module_memfree+0x30/0x50) [ 9532.460306][ T30] r9:83ee9800 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f089000 [ 9532.460606][ T30] [<802ea300>] (module_memfree) from [<8038898c>] (bpf_jit_free_exec+0x10/0x14) [ 9532.460972][ T30] r5:00001000 r4:e0915000 [ 9532.461183][ T30] [<8038897c>] (bpf_jit_free_exec) from [<80388b4c>] (bpf_jit_free+0x68/0xe4) [ 9532.461434][ T30] [<80388ae4>] (bpf_jit_free) from [<80389c2c>] (bpf_prog_free_deferred+0x14c/0x164) [ 9532.462047][ T30] r5:85a8af50 r4:85a8ac00 [ 9532.462319][ T30] [<80389ae0>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 9532.465212][ T30] r7:dddd1280 r6:82c16000 r5:85a8af50 r4:85611380 [ 9532.465504][ T30] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 9532.465862][ T30] r10:61c88647 r9:83ee9800 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:856113ac [ 9532.466096][ T30] r4:85611380 [ 9532.466218][ T30] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 9532.470546][ T30] r10:00000000 r9:e0ae1e90 r8:98c2f700 r7:85611380 r6:8026736c r5:83ee9800 [ 9532.471317][ T30] r4:98c2f240 [ 9532.471444][ T30] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 9532.471738][ T30] Exception stack(0xe0b01fb0 to 0xe0b01ff8) [ 9532.471947][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 9532.472213][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9532.472428][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9532.472724][ T30] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:98c2f240 [ 9532.473064][ T30] INFO: task kworker/0:42:11943 blocked for more than 430 seconds. [ 9532.473829][ T30] Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.474037][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9532.474252][ T30] task:kworker/0:42 state:D stack:0 pid:11943 tgid:11943 ppid:2 flags:0x00000000 [ 9532.474722][ T30] Workqueue: events bpf_prog_free_deferred [ 9532.486120][ T30] Backtrace: [ 9532.486977][ T30] [<81856d84>] (__schedule) from [<818579bc>] (schedule+0x2c/0xb8) [ 9532.487416][ T30] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:e0b05dac r5:83eed400 [ 9532.487830][ T30] r4:83eed400 [ 9532.488010][ T30] [<81857990>] (schedule) from [<81857f88>] (schedule_preempt_disabled+0x18/0x24) [ 9532.488294][ T30] r5:83eed400 r4:8270dd74 [ 9532.488435][ T30] [<81857f70>] (schedule_preempt_disabled) from [<8185a870>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 9532.488744][ T30] [<8185a588>] (__mutex_lock.constprop.0) from [<8185b13c>] (__mutex_lock_slowpath+0x14/0x18) [ 9532.489052][ T30] r10:82c16005 r9:e0b05e38 r8:00000000 r7:ffffffff r6:00000000 r5:a443e7c0 [ 9532.489346][ T30] r4:00000000 [ 9532.489471][ T30] [<8185b128>] (__mutex_lock_slowpath) from [<8185b17c>] (mutex_lock+0x3c/0x40) [ 9532.489731][ T30] [<8185b140>] (mutex_lock) from [<8048dda4>] (_vm_unmap_aliases+0x60/0x2e4) [ 9532.501671][ T30] [<8048dd44>] (_vm_unmap_aliases) from [<80491944>] (vfree+0x170/0x1e0) [ 9532.502127][ T30] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:a443e7c0 [ 9532.502525][ T30] r4:00000000 [ 9532.505575][ T30] [<804917d4>] (vfree) from [<802ea330>] (module_memfree+0x30/0x50) [ 9532.510353][ T30] r9:83eed400 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f08b000 [ 9532.510890][ T30] [<802ea300>] (module_memfree) from [<8038898c>] (bpf_jit_free_exec+0x10/0x14) [ 9532.511247][ T30] r5:00001000 r4:e091f000 [ 9532.511393][ T30] [<8038897c>] (bpf_jit_free_exec) from [<80388b4c>] (bpf_jit_free+0x68/0xe4) [ 9532.511930][ T30] [<80388ae4>] (bpf_jit_free) from [<80389c2c>] (bpf_prog_free_deferred+0x14c/0x164) [ 9532.512509][ T30] r5:85a8b350 r4:85a8b000 [ 9532.512650][ T30] [<80389ae0>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 9532.513155][ T30] r7:dddd1280 r6:82c16000 r5:85a8b350 r4:85611c80 [ 9532.513328][ T30] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 9532.513568][ T30] r10:61c88647 r9:83eed400 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:85611cac [ 9532.513779][ T30] r4:85611c80 [ 9532.513904][ T30] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 9532.514252][ T30] r10:00000000 r9:e0b01e90 r8:98c2f840 r7:85611c80 r6:8026736c r5:83eed400 [ 9532.514540][ T30] r4:98c2f240 [ 9532.514692][ T30] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 9532.529167][ T30] Exception stack(0xe0b05fb0 to 0xe0b05ff8) [ 9532.529611][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 9532.529964][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9532.530201][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9532.530939][ T30] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:98c2f240 [ 9532.531432][ T30] INFO: task kworker/0:43:11944 blocked for more than 430 seconds. [ 9532.531785][ T30] Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.532115][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9532.536434][ T30] task:kworker/0:43 state:D stack:0 pid:11944 tgid:11944 ppid:2 flags:0x00000000 [ 9532.537372][ T30] Workqueue: events bpf_prog_free_deferred [ 9532.537781][ T30] Backtrace: [ 9532.538071][ T30] [<81856d84>] (__schedule) from [<818579bc>] (schedule+0x2c/0xb8) [ 9532.538349][ T30] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:e0a7ddac r5:83eeec00 [ 9532.538885][ T30] r4:83eeec00 [ 9532.539199][ T30] [<81857990>] (schedule) from [<81857f88>] (schedule_preempt_disabled+0x18/0x24) [ 9532.548244][ T30] r5:83eeec00 r4:8270dd74 [ 9532.548600][ T30] [<81857f70>] (schedule_preempt_disabled) from [<8185a870>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 9532.549009][ T30] [<8185a588>] (__mutex_lock.constprop.0) from [<8185b13c>] (__mutex_lock_slowpath+0x14/0x18) [ 9532.549785][ T30] r10:82c16005 r9:e0a7de38 r8:00000000 r7:ffffffff r6:00000000 r5:a443e580 [ 9532.550060][ T30] r4:00000000 [ 9532.550207][ T30] [<8185b128>] (__mutex_lock_slowpath) from [<8185b17c>] (mutex_lock+0x3c/0x40) [ 9532.550512][ T30] [<8185b140>] (mutex_lock) from [<8048dda4>] (_vm_unmap_aliases+0x60/0x2e4) [ 9532.559550][ T30] [<8048dd44>] (_vm_unmap_aliases) from [<80491944>] (vfree+0x170/0x1e0) [ 9532.560099][ T30] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:a443e580 [ 9532.560394][ T30] r4:00000000 [ 9532.565243][ T30] [<804917d4>] (vfree) from [<802ea330>] (module_memfree+0x30/0x50) [ 9532.568004][ T30] r9:83eeec00 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f087000 [ 9532.568759][ T30] [<802ea300>] (module_memfree) from [<8038898c>] (bpf_jit_free_exec+0x10/0x14) [ 9532.569247][ T30] r5:00001000 r4:e090f000 [ 9532.569407][ T30] [<8038897c>] (bpf_jit_free_exec) from [<80388b4c>] (bpf_jit_free+0x68/0xe4) [ 9532.569706][ T30] [<80388ae4>] (bpf_jit_free) from [<80389c2c>] (bpf_prog_free_deferred+0x14c/0x164) [ 9532.575901][ T30] r5:85a8ab50 r4:85a8a800 [ 9532.576238][ T30] [<80389ae0>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 9532.576692][ T30] r7:dddd1280 r6:82c16000 r5:85a8ab50 r4:85611e80 [ 9532.577062][ T30] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 9532.584427][ T30] r10:61c88647 r9:83eeec00 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:85611eac [ 9532.585408][ T30] r4:85611e80 [ 9532.585644][ T30] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 9532.586195][ T30] r10:00000000 r9:e0b01e90 r8:98c2f4c0 r7:85611e80 r6:8026736c r5:83eeec00 [ 9532.586747][ T30] r4:98c2f240 [ 9532.586880][ T30] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 9532.587282][ T30] Exception stack(0xe0a7dfb0 to 0xe0a7dff8) [ 9532.587644][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 9532.588504][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9532.589032][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9532.589302][ T30] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:98c2f240 [ 9532.589841][ T30] INFO: task kworker/0:44:11945 blocked for more than 430 seconds. [ 9532.590855][ T30] Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.591084][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9532.591936][ T30] task:kworker/0:44 state:D stack:0 pid:11945 tgid:11945 ppid:2 flags:0x00000000 [ 9532.592316][ T30] Workqueue: events bpf_prog_free_deferred [ 9532.592573][ T30] Backtrace: [ 9532.592866][ T30] [<81856d84>] (__schedule) from [<818579bc>] (schedule+0x2c/0xb8) [ 9532.593247][ T30] r10:82c16005 r9:00000000 r8:8270dd78 r7:00000002 r6:e0ad1dac r5:84156000 [ 9532.593666][ T30] r4:84156000 [ 9532.593977][ T30] [<81857990>] (schedule) from [<81857f88>] (schedule_preempt_disabled+0x18/0x24) [ 9532.594424][ T30] r5:84156000 r4:8270dd74 [ 9532.594788][ T30] [<81857f70>] (schedule_preempt_disabled) from [<8185a870>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 9532.617149][ T30] [<8185a588>] (__mutex_lock.constprop.0) from [<8185b13c>] (__mutex_lock_slowpath+0x14/0x18) [ 9532.617571][ T30] r10:82c16005 r9:e0ad1e38 r8:00000000 r7:ffffffff r6:00000000 r5:a443e300 [ 9532.623530][ T30] r4:00000000 [ 9532.623852][ T30] [<8185b128>] (__mutex_lock_slowpath) from [<8185b17c>] (mutex_lock+0x3c/0x40) [ 9532.624185][ T30] [<8185b140>] (mutex_lock) from [<8048dda4>] (_vm_unmap_aliases+0x60/0x2e4) [ 9532.627030][ T30] [<8048dd44>] (_vm_unmap_aliases) from [<80491944>] (vfree+0x170/0x1e0) [ 9532.627538][ T30] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:a443e300 [ 9532.627854][ T30] r4:00000000 [ 9532.627973][ T30] [<804917d4>] (vfree) from [<802ea330>] (module_memfree+0x30/0x50) [ 9532.628216][ T30] r9:84156000 r8:00000000 r7:00000000 r6:82c16000 r5:00001000 r4:7f083000 [ 9532.628855][ T30] [<802ea300>] (module_memfree) from [<8038898c>] (bpf_jit_free_exec+0x10/0x14) [ 9532.629309][ T30] r5:00001000 r4:e08f7000 [ 9532.629565][ T30] [<8038897c>] (bpf_jit_free_exec) from [<80388b4c>] (bpf_jit_free+0x68/0xe4) [ 9532.629945][ T30] [<80388ae4>] (bpf_jit_free) from [<80389c2c>] (bpf_prog_free_deferred+0x14c/0x164) 02:38:52 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) [ 9532.655637][ T30] r5:85a8a350 r4:85a8a000 [ 9532.656160][ T30] [<80389ae0>] (bpf_prog_free_deferred) from [<80267064>] (process_one_work+0x19c/0x4a4) [ 9532.656456][ T30] r7:dddd1280 r6:82c16000 r5:85a8a350 r4:85418000 [ 9532.656630][ T30] [<80266ec8>] (process_one_work) from [<802675ac>] (worker_thread+0x240/0x48c) [ 9532.656975][ T30] r10:61c88647 r9:84156000 r8:dddd12a0 r7:82604d40 r6:dddd1280 r5:8541802c [ 9532.657171][ T30] r4:85418000 [ 9532.657368][ T30] [<8026736c>] (worker_thread) from [<8026e888>] (kthread+0x104/0x134) [ 9532.657623][ T30] r10:00000000 r9:e0a7de90 r8:98c2f900 r7:85418000 r6:8026736c r5:84156000 [ 9532.657818][ T30] r4:98c2f240 [ 9532.657961][ T30] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 9532.658183][ T30] Exception stack(0xe0ad1fb0 to 0xe0ad1ff8) [ 9532.658396][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 9532.665447][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9532.666320][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9532.666574][ T30] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:98c2f240 [ 9532.666803][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 9532.668907][ T30] NMI backtrace for cpu 0 [ 9532.669192][ T30] CPU: 0 PID: 30 Comm: khungtaskd Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.669667][ T30] Hardware name: ARM-Versatile Express [ 9532.669890][ T30] Backtrace: [ 9532.670032][ T30] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9532.670310][ T30] r7:00000000 r6:00000113 r5:60000193 r4:81fbd1a4 [ 9532.670576][ T30] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9532.671080][ T30] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9532.671669][ T30] r5:00000000 r4:00000001 [ 9532.671825][ T30] [<81852f28>] (dump_stack) from [<81822d58>] (nmi_cpu_backtrace+0x160/0x17c) [ 9532.672157][ T30] [<81822bf8>] (nmi_cpu_backtrace) from [<81822ea4>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 9532.672618][ T30] r7:00000000 r6:8260c494 r5:8261a7d8 r4:ffffffff [ 9532.672767][ T30] [<81822d74>] (nmi_trigger_cpumask_backtrace) from [<80210574>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 9532.674054][ T30] r9:827d8cdf r8:82894eb8 r7:8260c5ec r6:00007d4e r5:8261adc8 r4:a02f602c [ 9532.674939][ T30] [<8021055c>] (arch_trigger_cpumask_backtrace) from [<80347cf4>] (watchdog+0x48c/0x59c) [ 9532.675525][ T30] [<80347868>] (watchdog) from [<8026e888>] (kthread+0x104/0x134) [ 9532.675801][ T30] r10:00000000 r9:df819e58 r8:82e67440 r7:00000000 r6:80347868 r5:82ee1800 [ 9532.676107][ T30] r4:82f458c0 [ 9532.676377][ T30] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 9532.676633][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 9532.676948][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 9532.677244][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9532.677824][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9532.678150][ T30] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:82f458c0 [ 9532.679707][ T30] Sending NMI from CPU 0 to CPUs 1: [ 9532.680380][ C1] NMI backtrace for cpu 1 [ 9532.680636][ C1] CPU: 1 PID: 2798 Comm: klogd Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.680688][ C1] Hardware name: ARM-Versatile Express [ 9532.680728][ C1] PC is at should_failslab+0x0/0x20 [ 9532.680806][ C1] LR is at __kmalloc_node_track_caller+0xa4/0x478 [ 9532.680851][ C1] pc : [<804a5e20>] lr : [<804a5ee4>] psr: 60000013 [ 9532.680891][ C1] sp : ebd9dca8 ip : ebd9dd08 fp : ebd9dd04 [ 9532.680925][ C1] r10: 00482cc0 r9 : 00000200 r8 : 00482cc0 [ 9532.680966][ C1] r7 : 83eec800 r6 : 00482cc0 r5 : 00000200 r4 : 82c02240 [ 9532.681006][ C1] r3 : 00000000 r2 : 8218f5f4 r1 : 00482cc0 r0 : 82c02240 [ 9532.681125][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 9532.681192][ C1] Control: 30c5387d Table: 843b3680 DAC: 00000000 [ 9532.681251][ C1] Backtrace: [ 9532.681302][ C1] [<804a5e40>] (__kmalloc_node_track_caller) from [<81357a08>] (kmalloc_reserve+0x68/0xfc) [ 9532.681384][ C1] r10:00482cc0 r9:00000200 r8:81359290 r7:ffffffff r6:ebd9dd43 r5:ebd9dd3c [ 9532.681400][ C1] r4:00400cc0 [ 9532.681412][ C1] [<813579a0>] (kmalloc_reserve) from [<81359290>] (__alloc_skb+0x90/0x15c) [ 9532.681478][ C1] r10:ebd9de1c r9:00000000 r8:00400cc0 r7:82cab780 r6:00000000 r5:ffffffff [ 9532.681496][ C1] r4:95398cc0 r3:ebd9dd43 [ 9532.681506][ C1] [<81359200>] (__alloc_skb) from [<8136002c>] (alloc_skb_with_frags+0x40/0x170) [ 9532.681562][ C1] r8:802a32e4 r7:ebd9ddbc r6:00000000 r5:00001000 r4:00000003 [ 9532.681574][ C1] [<8135ffec>] (alloc_skb_with_frags) from [<81352694>] (sock_alloc_send_pskb+0x1f4/0x228) [ 9532.681636][ C1] r10:ebd9de1c r9:00000000 r8:802a32e4 r7:ebd9ddbc r6:83eec800 r5:7fffffff [ 9532.681652][ C1] r4:82e03600 r3:ebd9de1c [ 9532.681663][ C1] [<813524a0>] (sock_alloc_send_pskb) from [<815f4774>] (unix_dgram_sendmsg+0x160/0x9e8) [ 9532.681724][ C1] r10:00000000 r9:83eec800 r8:82e03600 r7:0000003e r6:00000000 r5:8304bb80 [ 9532.681740][ C1] r4:ebd9de98 [ 9532.681750][ C1] [<815f4614>] (unix_dgram_sendmsg) from [<8134bce8>] (__sock_sendmsg+0x44/0x78) [ 9532.681805][ C1] r10:00000121 r9:83eec800 r8:00000003 r7:8304bb80 r6:8304bb80 r5:ebd9de98 [ 9532.681820][ C1] r4:00000000 [ 9532.681831][ C1] [<8134bca4>] (__sock_sendmsg) from [<8134dff8>] (__sys_sendto+0x108/0x14c) [ 9532.681880][ C1] r7:8304bb80 r6:00000000 r5:00004000 r4:00000000 [ 9532.681891][ C1] [<8134def0>] (__sys_sendto) from [<8134e080>] (sys_send+0x20/0x28) [ 9532.681942][ C1] r8:80200288 r7:00000121 r6:76fd25a0 r5:76fd25a0 r4:01db2208 [ 9532.681955][ C1] [<8134e060>] (sys_send) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 9532.681999][ C1] Exception stack(0xebd9dfa8 to 0xebd9dff0) [ 9532.682038][ C1] dfa0: 01db2208 76fd25a0 00000003 01db2358 0000003e 00004000 [ 9532.682073][ C1] dfc0: 01db2208 76fd25a0 76fd25a0 00000121 00000000 00000013 76ea0e60 01db235b [ 9532.682096][ C1] dfe0: 00000000 7ed2ebc8 76e28460 76e2d918 [ 9532.713579][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 9532.714216][ T30] CPU: 0 PID: 30 Comm: khungtaskd Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.714524][ T30] Hardware name: ARM-Versatile Express [ 9532.714801][ T30] Backtrace: [ 9532.715075][ T30] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9532.715458][ T30] r7:00000000 r6:82622dc4 r5:60000093 r4:81fbd1a4 [ 9532.715905][ T30] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9532.716201][ T30] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9532.717058][ T30] r5:00000000 r4:8284fd18 [ 9532.717207][ T30] [<81852f28>] (dump_stack) from [<818364d0>] (panic+0x120/0x378) [ 9532.718069][ T30] [<818363b0>] (panic) from [<80347b80>] (watchdog+0x318/0x59c) [ 9532.718373][ T30] r3:00000000 r2:00000000 r1:00000001 r0:81fbdc60 [ 9532.718546][ T30] r7:8260c5ec [ 9532.718653][ T30] [<80347868>] (watchdog) from [<8026e888>] (kthread+0x104/0x134) [ 9532.718913][ T30] r10:00000000 r9:df819e58 r8:82e67440 r7:00000000 r6:80347868 r5:82ee1800 [ 9532.719214][ T30] r4:82f458c0 [ 9532.719317][ T30] [<8026e784>] (kthread) from [<80200104>] (ret_from_fork+0x14/0x30) [ 9532.719529][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 9532.719762][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 9532.719995][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9532.720262][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9532.720459][ T30] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026e784 r4:82f458c0 [ 9532.721334][ C1] CPU1: stopping [ 9532.721442][ C1] CPU: 1 PID: 19190 Comm: modprobe Not tainted 6.8.0-rc1-syzkaller #0 [ 9532.721492][ C1] Hardware name: ARM-Versatile Express [ 9532.721513][ C1] Backtrace: frame pointer underflow [ 9532.721618][ C1] [<8183592c>] (dump_backtrace) from [<81835a28>] (show_stack+0x18/0x1c) [ 9532.721728][ C1] r7:00000014 r6:81b0f95c r5:600001d3 r4:81fbd1a4 [ 9532.721740][ C1] [<81835a10>] (show_stack) from [<81852f1c>] (dump_stack_lvl+0x48/0x54) [ 9532.721793][ C1] [<81852ed4>] (dump_stack_lvl) from [<81852f40>] (dump_stack+0x18/0x1c) [ 9532.721844][ C1] r5:00000001 r4:00000004 [ 9532.721854][ C1] [<81852f28>] (dump_stack) from [<8020fb78>] (do_handle_IPI+0x2ac/0x2d8) [ 9532.721905][ C1] [<8020f8cc>] (do_handle_IPI) from [<8020fbc4>] (ipi_handler+0x20/0x28) [ 9532.722036][ C1] r9:a1a48c00 r8:df805f78 r7:00000014 r6:81b0f95c r5:82c0cc80 r4:82c96d00 [ 9532.722049][ C1] [<8020fba4>] (ipi_handler) from [<802c5004>] (handle_percpu_devid_irq+0x9c/0x2cc) [ 9532.722100][ C1] [<802c4f68>] (handle_percpu_devid_irq) from [<802be790>] (generic_handle_domain_irq+0x30/0x40) [ 9532.722164][ C1] r10:dee1e85c r9:a1a48c00 r8:00000000 r7:df80a00c r6:824b0bc0 r5:df80a000 [ 9532.722181][ C1] r4:8260cd28 r3:00010002 [ 9532.722190][ C1] [<802be760>] (generic_handle_domain_irq) from [<802011c4>] (gic_handle_irq+0x68/0x7c) [ 9532.722230][ C1] [<8020115c>] (gic_handle_irq) from [<818537e0>] (generic_handle_arch_irq+0x60/0x80) [ 9532.722288][ C1] r7:edc21d80 r6:8213c5ac r5:82178130 r4:824b2224 [ 9532.722298][ C1] [<81853780>] (generic_handle_arch_irq) from [<81805a00>] (call_with_stack+0x1c/0x20) [ 9532.722362][ C1] r9:a1a48c00 r8:842a3900 r7:edc21db4 r6:ffffffff r5:60000113 r4:80432eb8 [ 9532.722374][ C1] [<818059e4>] (call_with_stack) from [<80200b84>] (__irq_svc+0x84/0xac) [ 9532.722413][ C1] Exception stack(0xedc21d80 to 0xedc21dc8) [ 9532.722459][ C1] 1d80: dee1e85c dee1e85c 80430b90 00000000 dee1e85c 824affe0 f2d1f75f 00000000 [ 9532.722497][ C1] 1da0: 842a3900 840c4600 dee1e85c edc21de4 edc21db8 edc21dd0 80432dc0 80432eb8 [ 9532.722517][ C1] 1dc0: 60000113 ffffffff [ 9532.722531][ C1] [<80432df0>] (folio_add_lru) from [<804338d8>] (folio_add_lru_vma+0x44/0x64) [ 9532.722587][ C1] r5:842a3900 r4:dee1e85c [ 9532.722597][ C1] [<80433894>] (folio_add_lru_vma) from [<8046fe64>] (do_wp_page+0x540/0x116c) [ 9532.722652][ C1] r5:00e00000 r4:edc21eb8 [ 9532.722662][ C1] [<8046f924>] (do_wp_page) from [<80473bac>] (handle_mm_fault+0xa4c/0x12d0) [ 9532.722724][ C1] r10:00000040 r9:840c4600 r8:a1a48c00 r7:842a3900 r6:76df21b8 r5:a1a48c00 [ 9532.722739][ C1] r4:00001255 [ 9532.722750][ C1] [<80473160>] (handle_mm_fault) from [<80215de4>] (do_page_fault+0x1c8/0x3a4) [ 9532.722805][ C1] r10:00000002 r9:840c4600 r8:a1a48c00 r7:00000a0f r6:00000255 r5:76df21b8 [ 9532.722820][ C1] r4:edc21fb0 [ 9532.722830][ C1] [<80215c1c>] (do_page_fault) from [<802161a8>] (do_DataAbort+0x38/0xa8) [ 9532.722885][ C1] r10:004f0fc8 r9:76ef92f4 r8:80215c1c r7:edc21fb0 r6:76df21b8 r5:00000a0f [ 9532.722899][ C1] r4:8261d0d0 [ 9532.722910][ C1] [<80216170>] (do_DataAbort) from [<80200e3c>] (__dabt_usr+0x5c/0x60) [ 9532.722947][ C1] Exception stack(0xedc21fb0 to 0xedc21ff8) [ 9532.722981][ C1] 1fa0: 76ef92f4 00000000 00000000 00000001 [ 9532.723016][ C1] 1fc0: 76df21b8 00000000 00000000 76df0e60 76df136c 76ef92f4 004f0fc8 00000000 [ 9532.723046][ C1] 1fe0: 004f0fd4 7ea81e38 76ccd8e0 76ce226c 60000010 ffffffff [ 9532.723077][ C1] r8:824a8044 r7:a1a48c00 r6:ffffffff r5:60000010 r4:76ce226c [ 9532.730921][ T30] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:32:17 Registers: info registers vcpu 0 CPU#0 R00=ddb30000 R01=edb11000 R02=00000001 R03=8021b354 R04=7f05d000 R05=83883c00 R06=7f05d000 R07=00000000 R08=8289fc68 R09=8270dd58 R10=00000000 R11=e0a95d84 R12=e0a95d88 R13=e0a95d58 R14=80210b30 R15=8021b36c PSR=80000013 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000003 R01=76f7a21a R02=7ed2eca4 R03=00000000 R04=76f9819a R05=76f98140 R06=76fd25a0 R07=7ed2eca4 R08=00000000 R09=00000003 R10=76f98554 R11=76f7a21a R12=76f97dd8 R13=ebd9dff8 R14=76e28084 R15=76e28084 PSR=40000093 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000