[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.18' (ECDSA) to the list of known hosts. 2020/12/03 19:39:48 fuzzer started 2020/12/03 19:39:48 dialing manager at 10.128.0.26:45027 2020/12/03 19:39:50 syscalls: 117 2020/12/03 19:39:50 code coverage: enabled 2020/12/03 19:39:50 comparison tracing: enabled 2020/12/03 19:39:50 extra coverage: enabled 2020/12/03 19:39:50 setuid sandbox: enabled 2020/12/03 19:39:50 namespace sandbox: enabled 2020/12/03 19:39:50 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/03 19:39:50 fault injection: enabled 2020/12/03 19:39:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/03 19:39:50 net packet injection: enabled 2020/12/03 19:39:50 net device setup: enabled 2020/12/03 19:39:50 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/12/03 19:39:50 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/03 19:39:50 USB emulation: enabled 2020/12/03 19:39:50 hci packet injection: enabled 2020/12/03 19:39:50 wifi device emulation: enabled 19:39:50 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000006c0)={'wg1\x00'}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000740)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid\x00') openat$cgroup_devices(r5, &(0x7f00000007c0)='devices.allow\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xfffffffffffff801) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000800), 0x8) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000840)=r6) r7 = openat$cgroup_ro(r5, &(0x7f0000000880)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map=r7, r4, 0x19}, 0x10) 19:39:51 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000880)={r6, r3}) r8 = perf_event_open$cgroup(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x20, 0x5, 0x5, 0x0, 0x2, 0x4c18b, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000940), 0x2}, 0x0, 0x0, 0x7, 0x9, 0x9, 0x8000, 0x6}, r3, 0x5, r3, 0x4) perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x64, 0x87, 0x4a, 0x3, 0x0, 0x7fffffff, 0x10, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x6}, 0x0, 0xffff, 0x23, 0x7, 0xcc, 0x8}, 0xffffffffffffffff, 0x7, r8, 0x9) ioctl$TUNSETLINK(r7, 0x400454cd, 0x338) r9 = openat$cgroup(r3, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r9, &(0x7f0000000a40)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000a80)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0xffffffffffffffff) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:39:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup(r3, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r6, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r7, r3, 0x11}, 0x10) write$cgroup_int(r3, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r6}, 0x8) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, r10, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r2, r11}, 0x78) 19:39:51 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x56, 0x800, 0x800, 0x804, r4, 0x800, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) r5 = openat$cgroup_ro(r0, &(0x7f0000000300)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000340)) openat$cgroup_freezer_state(r5, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={r5, &(0x7f00000003c0)="d47b7bac"}, 0x20) openat$cgroup_type(r4, &(0x7f0000000440)='cgroup.type\x00', 0x2, 0x0) 19:39:51 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r5}, 0x8) ioctl$TUNSETLINK(r6, 0x400454cd, 0x203) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x18, 0x7, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @generic={0x81, 0xe, 0x1, 0x4094, 0xecc}]}, &(0x7f0000000d80)='GPL\x00', 0x200, 0x1000, &(0x7f0000000dc0)=""/4096, 0x41000, 0x12, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000001e00)={0x3, 0x9, 0x3ff, 0x5}, 0x10}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001ec0)={&(0x7f0000000d00)='./file0\x00', r7}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/net/tun\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002080)={0x19, 0xa, &(0x7f0000001f40)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9a}, @generic={0x1f, 0x4, 0x7, 0x0, 0x9}, @generic={0x81, 0x7, 0xf, 0x7c, 0xfff}, @alu={0x4, 0x1, 0x0, 0x1, 0x7, 0x100, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x8f}, @call={0x85, 0x0, 0x0, 0x94}, @generic={0x4, 0xf, 0xb, 0xffff, 0x9}], &(0x7f0000001fc0)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x40f00, 0x4, [], 0x0, 0x19, r0, 0x8, &(0x7f0000002000)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002040)={0x3, 0xd, 0x6, 0x2800000}, 0x10, 0xffffffffffffffff, r1}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000003380)={&(0x7f0000002100)="13fa12d2944cfbad3673888b915b08bea2be0162d7ee91b2f60125f5457c810bf3b7ae3beb9b3888b2f7291838c8081c95d60e2aa6e4517b31ccfcff60617171afab26ffbe2e4256b0679a7f4ba4ec1c16fd772a199838f52f3e12db024bc19c4204a9f5f19250497dc0a35158d8fe8690927f23c00bff858b39f7ea07ef558302119334c459ff65a8440cb19001b43ac3f5656160b34eb9e0a67277baeba1c249660ac44a91f50efc94fe5a717060d400cd3529982b45abf0ecfa76c19a9119801a57e764c97c7a08645b243b", &(0x7f0000002200)=""/4096, &(0x7f0000003200)="039386fd7c7b52626ce1861d6b4bec357966a020cfcf7199b17ed792b1604d7bbe821102da64dc3344436d77a0eff1bcfd89e938aedc36e703878f929304d49e863e21a993c40b92f2e40f75e22e167c76f4fa256c25f520d343ff19e16cb3ca07f08ea78e53a683d8548c4a9068fc78746ff7cbdda1a97761792779ebe7c053b39ab36422acf5d1be631c8561bf5cba71b62e24bbb3e42f01bfa3219efced1a6e73c94c10fc437c637331d67c4b89132b22d9d772488b5a36659208480b731d9e85524f2779ee", &(0x7f0000003300)="71108b207250c076979bfab99c9f57fc9944cae27b658e25556bb5256f93b75ef4ba1b9a5923e40a7293ed9bfcb7d0584092a60b76abd8b20003772f1d54f85cf26dace6ae03923a", 0x2, 0x1, 0x4}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000003540)={0x1, &(0x7f00000033c0)="aed5459da70360423fcd425656affd573e8e02ce55eef8decd048e1272640e3d6d6150bd3f8066ac5e50f1e258a49b27e6b4eb0d3bd00f45d2db8abcac899b2137c0118f4cfda117286ffcad2c0e7e9e4aebf094d2a06248f034a1cf2fb39f65076813c1f48ce6f992e80095609b953481631a6cdb281fc0bf916048e01bbcd8da747e40af1455ab28050aac51fe08265bb52b7c4e6c5359b4ba107454093e458aba97d603b7f43273dbcdc8a9ff8e146d0892348d2788979d6a59ae8ccb38cc78a2a2bd3587ce", &(0x7f00000034c0)=""/87}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) write$cgroup_int(r6, &(0x7f00000035c0)=0x5, 0x12) 19:39:51 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) write$cgroup_int(r0, &(0x7f000002b1c0)=0x6df2, 0x12) r6 = openat$cgroup(r5, &(0x7f000002b200)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f000002b240)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f000002b280)={0xd9a}, 0x8) openat$cgroup_netprio_ifpriomap(r6, &(0x7f000002b2c0)='net_prio.ifpriomap\x00', 0x2, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f000002b300)={r5}, 0x8) openat$cgroup_type(r7, &(0x7f000002b340)='cgroup.type\x00', 0x2, 0x0) gettid() openat$cgroup_subtree(r7, &(0x7f000002b380)='cgroup.subtree_control\x00', 0x2, 0x0) syzkaller login: [ 71.800772][ T8540] IPVS: ftp: loaded support on port[0] = 21 [ 72.052568][ T8540] chnl_net:caif_netlink_parms(): no params data found [ 72.055743][ T8543] IPVS: ftp: loaded support on port[0] = 21 [ 72.139018][ T8540] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.148079][ T8540] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.194928][ T8540] device bridge_slave_0 entered promiscuous mode [ 72.210356][ T8540] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.218631][ T8540] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.228361][ T8540] device bridge_slave_1 entered promiscuous mode [ 72.282476][ T8540] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.298457][ T8540] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.316486][ T8545] IPVS: ftp: loaded support on port[0] = 21 [ 72.341642][ T8540] team0: Port device team_slave_0 added [ 72.383674][ T8540] team0: Port device team_slave_1 added [ 72.527828][ T8540] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.535195][ T8540] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.567667][ T8540] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.595865][ T8547] IPVS: ftp: loaded support on port[0] = 21 [ 72.602687][ T8540] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 72.622105][ T8540] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.649906][ T8540] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 72.662227][ T8543] chnl_net:caif_netlink_parms(): no params data found [ 72.768742][ T8549] IPVS: ftp: loaded support on port[0] = 21 [ 72.769790][ T8540] device hsr_slave_0 entered promiscuous mode [ 72.785516][ T8540] device hsr_slave_1 entered promiscuous mode [ 72.875428][ T8543] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.882559][ T8543] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.892789][ T8543] device bridge_slave_0 entered promiscuous mode [ 72.906608][ T8543] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.913789][ T8543] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.921694][ T8543] device bridge_slave_1 entered promiscuous mode [ 73.079912][ T8543] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.141349][ T8543] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.169540][ T8564] IPVS: ftp: loaded support on port[0] = 21 [ 73.219178][ T8545] chnl_net:caif_netlink_parms(): no params data found [ 73.241541][ T8543] team0: Port device team_slave_0 added [ 73.286447][ T8543] team0: Port device team_slave_1 added [ 73.331920][ T8543] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 73.341320][ T8543] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.368632][ T8543] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 73.419274][ T8543] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.427838][ T8543] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.455300][ T8543] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.551478][ T8540] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 73.649518][ T8540] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 73.665085][ T8540] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 73.684864][ T8540] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 73.701424][ T8549] chnl_net:caif_netlink_parms(): no params data found [ 73.719556][ T8543] device hsr_slave_0 entered promiscuous mode [ 73.728413][ T8543] device hsr_slave_1 entered promiscuous mode [ 73.736921][ T8543] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 73.744976][ T8543] Cannot create hsr debugfs directory [ 73.761911][ T8545] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.769830][ T3082] Bluetooth: hci0: command 0x0409 tx timeout [ 73.782022][ T8545] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.790585][ T8545] device bridge_slave_0 entered promiscuous mode [ 73.801355][ T8545] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.812602][ T8545] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.821549][ T8545] device bridge_slave_1 entered promiscuous mode [ 73.838185][ T8547] chnl_net:caif_netlink_parms(): no params data found [ 73.906159][ T8545] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.957068][ T8545] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.994104][ T3082] Bluetooth: hci1: command 0x0409 tx timeout [ 74.121873][ T8564] chnl_net:caif_netlink_parms(): no params data found [ 74.141717][ T8545] team0: Port device team_slave_0 added [ 74.196417][ T8549] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.204264][ T8549] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.212546][ T8549] device bridge_slave_0 entered promiscuous mode [ 74.237333][ T8545] team0: Port device team_slave_1 added [ 74.252212][ T3215] Bluetooth: hci2: command 0x0409 tx timeout [ 74.299838][ T8549] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.311086][ T8549] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.321239][ T8549] device bridge_slave_1 entered promiscuous mode [ 74.365344][ T8545] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 74.372344][ T8545] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.399308][ T8545] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 74.439481][ T8545] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 74.451775][ T8545] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.480789][ T8545] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 74.483091][ T5] Bluetooth: hci3: command 0x0409 tx timeout [ 74.501889][ T8547] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.509243][ T8547] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.518487][ T8547] device bridge_slave_0 entered promiscuous mode [ 74.544597][ T8547] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.551685][ T8547] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.568620][ T8547] device bridge_slave_1 entered promiscuous mode [ 74.583882][ T8549] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.595873][ T8549] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.633296][ T5] Bluetooth: hci4: command 0x0409 tx timeout [ 74.706174][ T8549] team0: Port device team_slave_0 added [ 74.723360][ T8545] device hsr_slave_0 entered promiscuous mode [ 74.730722][ T8545] device hsr_slave_1 entered promiscuous mode [ 74.738495][ T8545] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 74.746575][ T8545] Cannot create hsr debugfs directory [ 74.760852][ T8564] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.771549][ T8564] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.781184][ T8564] device bridge_slave_0 entered promiscuous mode [ 74.792158][ T8547] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.808781][ T8549] team0: Port device team_slave_1 added [ 74.835853][ T8564] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.843436][ T8564] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.851646][ T8564] device bridge_slave_1 entered promiscuous mode [ 74.860305][ T8543] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 74.877490][ T8547] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.887629][ T8549] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 74.895613][ T8549] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.922432][ T8549] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 74.958734][ T8543] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 74.979920][ T8549] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 74.987563][ T8549] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.013887][ T8549] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 75.032479][ T8564] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.041879][ T3002] Bluetooth: hci5: command 0x0409 tx timeout [ 75.050091][ T8543] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 75.070244][ T8547] team0: Port device team_slave_0 added [ 75.106976][ T8564] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.131931][ T8543] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 75.153105][ T8547] team0: Port device team_slave_1 added [ 75.169789][ T8549] device hsr_slave_0 entered promiscuous mode [ 75.177579][ T8549] device hsr_slave_1 entered promiscuous mode [ 75.186033][ T8549] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 75.203390][ T8549] Cannot create hsr debugfs directory [ 75.211787][ T8564] team0: Port device team_slave_0 added [ 75.223168][ T8564] team0: Port device team_slave_1 added [ 75.278002][ T8540] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.286017][ T8564] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 75.294545][ T8564] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.321791][ T8564] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 75.334589][ T8547] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 75.341565][ T8547] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.369510][ T8547] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 75.385193][ T8547] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 75.392266][ T8547] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.418934][ T8547] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 75.455685][ T8564] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 75.463867][ T8564] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.490919][ T8564] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 75.533144][ T8540] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.571786][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.585188][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.624929][ T8564] device hsr_slave_0 entered promiscuous mode [ 75.631922][ T8564] device hsr_slave_1 entered promiscuous mode [ 75.641871][ T8564] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 75.650021][ T8564] Cannot create hsr debugfs directory [ 75.673148][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.688090][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.696745][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.704017][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.733769][ T8547] device hsr_slave_0 entered promiscuous mode [ 75.742207][ T8547] device hsr_slave_1 entered promiscuous mode [ 75.751941][ T8547] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 75.760650][ T8547] Cannot create hsr debugfs directory [ 75.785155][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 75.834228][ T3082] Bluetooth: hci0: command 0x041b tx timeout [ 75.841435][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.851153][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.860209][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.867402][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.930207][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.014693][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 76.037882][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.055973][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.072789][ T3215] Bluetooth: hci1: command 0x041b tx timeout [ 76.073078][ T8545] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 76.121484][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.131267][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.141131][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.150289][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.159358][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.169022][ T8545] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 76.182562][ T8543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.215766][ T8545] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 76.241521][ T8543] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.262751][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.271293][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.281040][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.289112][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.299887][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.312847][ T17] Bluetooth: hci2: command 0x041b tx timeout [ 76.325974][ T8545] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 76.386300][ T8549] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 76.398531][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.413375][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.422029][ T3002] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.429388][ T3002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.437747][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.447161][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.457162][ T3002] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.464450][ T3002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.472914][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.485630][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.519013][ T8549] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 76.529667][ T8549] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 76.546282][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 76.552928][ T17] Bluetooth: hci3: command 0x041b tx timeout [ 76.555910][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.569738][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.580365][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.590132][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.600061][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.623372][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 76.630904][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 76.649618][ T8549] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 76.676119][ T8540] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.716660][ T3082] Bluetooth: hci4: command 0x041b tx timeout [ 76.729437][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.740870][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.749974][ T8564] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 76.808054][ T8564] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 76.818477][ T8564] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 76.849325][ T8564] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 76.860098][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.872318][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.914335][ T8543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.922135][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 76.932275][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 76.979842][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 76.988446][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.998607][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.007581][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 77.022824][ T8547] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 77.067875][ T8547] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 77.078472][ T8547] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 77.096058][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 77.103974][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 77.122494][ T8549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.139924][ T3082] Bluetooth: hci5: command 0x041b tx timeout [ 77.153584][ T8543] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.161869][ T8540] device veth0_vlan entered promiscuous mode [ 77.171020][ T8547] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 77.241158][ T8545] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.248725][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.258607][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.276256][ T8540] device veth1_vlan entered promiscuous mode [ 77.299087][ T8549] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.319284][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 77.332693][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 77.342024][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 77.378530][ T8545] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.415759][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 77.428937][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.439503][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.492477][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.501718][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.512049][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.519403][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.528521][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.538107][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.546955][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.554249][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.561827][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.571101][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.580344][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.587529][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.595343][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.636827][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.646247][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.655280][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.665409][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.676196][ T3082] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.683745][ T3082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.691968][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 77.700768][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 77.709514][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.718518][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.727585][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.736531][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.745990][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.755681][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.764617][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.773320][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 77.781510][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.811303][ T8543] device veth0_vlan entered promiscuous mode [ 77.820682][ T8540] device veth0_macvtap entered promiscuous mode [ 77.830948][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 77.845216][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.856995][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.866719][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 77.878469][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.889181][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.901019][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.911479][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.921228][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.929924][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.939043][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.947708][ T3215] Bluetooth: hci0: command 0x040f tx timeout [ 77.962359][ T8543] device veth1_vlan entered promiscuous mode [ 77.974726][ T8540] device veth1_macvtap entered promiscuous mode [ 77.990383][ T8564] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.007753][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 78.020383][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 78.053254][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.061776][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.083104][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.091458][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.105516][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.117446][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.131570][ T8549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.152844][ T17] Bluetooth: hci1: command 0x040f tx timeout [ 78.154591][ T8545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.176535][ T8547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.249039][ T8547] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.265829][ T8540] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 78.278784][ T8564] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.293034][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 78.302159][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.310856][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.321020][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.330780][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.339094][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 78.348353][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 78.357668][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 78.365931][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 78.393191][ T3082] Bluetooth: hci2: command 0x040f tx timeout [ 78.400136][ T8545] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.411115][ T8540] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 78.430850][ T8549] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.442542][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.451178][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.465501][ T3002] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.472671][ T3002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.484825][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 78.492396][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 78.506070][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.518269][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.528885][ T3002] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.536069][ T3002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.552188][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 78.569429][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 78.578913][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.587993][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.596994][ T3002] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.604492][ T3002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.612882][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 78.633152][ T3082] Bluetooth: hci3: command 0x040f tx timeout [ 78.641443][ T8540] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.655434][ T8540] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.666986][ T8540] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.678813][ T8540] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.714190][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.730988][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.741782][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.753779][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.762153][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.769277][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.787832][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 78.798553][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 78.804016][ T3082] Bluetooth: hci4: command 0x040f tx timeout [ 78.807794][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.833710][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.844037][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 78.892546][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 78.901443][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 78.911203][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 78.923203][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 78.932254][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 78.942730][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.951329][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.977021][ T8543] device veth0_macvtap entered promiscuous mode [ 79.015212][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 79.028560][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 79.038434][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 79.047814][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.056729][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.065388][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 79.074476][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.083434][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.091731][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.100825][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.109474][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.119564][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 79.130463][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 79.160046][ T8564] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 79.179968][ T8564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 79.194192][ T17] Bluetooth: hci5: command 0x040f tx timeout [ 79.218329][ T8543] device veth1_macvtap entered promiscuous mode [ 79.235425][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 79.245032][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.255277][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.274135][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.293686][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.359225][ T8545] device veth0_vlan entered promiscuous mode [ 79.401394][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 79.418916][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.439684][ T8543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 79.463554][ T8543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 79.476480][ T8543] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 79.496394][ T8547] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.514403][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.523844][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.525657][ T455] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 79.531689][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 79.551477][ T455] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 79.564844][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.573466][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 79.582095][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.591397][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 79.599839][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 79.607929][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 79.616833][ T8549] device veth0_vlan entered promiscuous mode [ 79.639903][ T8543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 79.651767][ T8543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 79.665892][ T8543] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 79.686053][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.697295][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.720805][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 79.730871][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 79.764479][ T8545] device veth1_vlan entered promiscuous mode [ 79.783071][ T9846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 79.790596][ T9846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 79.807476][ T8543] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.816305][ T8543] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.825220][ T8543] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.834468][ T8543] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.852967][ T8549] device veth1_vlan entered promiscuous mode [ 79.886258][ T8564] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.943996][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.958953][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.971601][ T27] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 79.993380][ T9846] Bluetooth: hci0: command 0x0419 tx timeout [ 80.003318][ T27] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 80.046120][ T8549] device veth0_macvtap entered promiscuous mode [ 80.060656][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 80.084632][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 80.110526][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 80.119252][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 80.142224][ T8547] device veth0_vlan entered promiscuous mode [ 80.181636][ T8549] device veth1_macvtap entered promiscuous mode [ 80.202993][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 80.210994][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 80.232855][ T17] Bluetooth: hci1: command 0x0419 tx timeout [ 80.234127][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 19:40:00 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000006c0)={'wg1\x00'}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000740)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid\x00') openat$cgroup_devices(r5, &(0x7f00000007c0)='devices.allow\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xfffffffffffff801) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000800), 0x8) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000840)=r6) r7 = openat$cgroup_ro(r5, &(0x7f0000000880)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map=r7, r4, 0x19}, 0x10) [ 80.278074][ T8547] device veth1_vlan entered promiscuous mode [ 80.337931][ T8545] device veth0_macvtap entered promiscuous mode [ 80.368195][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 19:40:00 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000006c0)={'wg1\x00'}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000740)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid\x00') openat$cgroup_devices(r5, &(0x7f00000007c0)='devices.allow\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xfffffffffffff801) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000800), 0x8) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000840)=r6) r7 = openat$cgroup_ro(r5, &(0x7f0000000880)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map=r7, r4, 0x19}, 0x10) [ 80.393946][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 80.402189][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 80.430724][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 80.443193][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 80.465037][ T455] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 80.474721][ T17] Bluetooth: hci2: command 0x0419 tx timeout [ 80.487926][ T455] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 80.525077][ T8545] device veth1_macvtap entered promiscuous mode [ 80.540785][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 80.550872][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 19:40:00 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000006c0)={'wg1\x00'}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000740)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid\x00') openat$cgroup_devices(r5, &(0x7f00000007c0)='devices.allow\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xfffffffffffff801) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000800), 0x8) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000840)=r6) r7 = openat$cgroup_ro(r5, &(0x7f0000000880)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map=r7, r4, 0x19}, 0x10) [ 80.573330][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 80.607618][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.631317][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 19:40:01 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000006c0)={'wg1\x00'}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000740)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid\x00') openat$cgroup_devices(r5, &(0x7f00000007c0)='devices.allow\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xfffffffffffff801) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000800), 0x8) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000840)=r6) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, r4, 0x19}, 0x10) [ 80.662655][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.678460][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.704655][ T8549] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 80.713141][ T17] Bluetooth: hci3: command 0x0419 tx timeout 19:40:01 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000006c0)={'wg1\x00'}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000740)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid\x00') openat$cgroup_devices(r5, &(0x7f00000007c0)='devices.allow\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xfffffffffffff801) bpf$ITER_CREATE(0x21, &(0x7f0000000800), 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, r4, 0x19}, 0x10) 19:40:01 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000006c0)={'wg1\x00'}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000740)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid\x00') openat$cgroup_devices(r5, &(0x7f00000007c0)='devices.allow\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xfffffffffffff801) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, r4, 0x19}, 0x10) [ 80.834460][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 80.851890][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 80.869059][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 80.873462][ T17] Bluetooth: hci4: command 0x0419 tx timeout 19:40:01 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000006c0)={'wg1\x00'}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000740)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid\x00') openat$cgroup_devices(r5, &(0x7f00000007c0)='devices.allow\x00', 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, r4, 0x19}, 0x10) [ 80.887716][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 80.900993][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 80.923449][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.939472][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.950249][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.980120][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.003848][ T8549] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 81.030421][ T409] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.032146][ T8545] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.051729][ T409] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.065097][ T8545] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.077006][ T8545] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.102669][ T8545] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.122344][ T8545] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.141307][ T8545] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.154624][ T8545] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 81.194719][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 81.204809][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 81.219521][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 81.227911][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 81.237403][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 81.246668][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 81.255643][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 81.268979][ T8549] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.280668][ T17] Bluetooth: hci5: command 0x0419 tx timeout [ 81.286930][ T8549] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.297289][ T8549] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.306257][ T8549] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.321909][ T8545] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.338784][ T8545] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.349881][ T8545] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.366193][ T8545] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.378430][ T8545] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.393758][ T8545] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.409223][ T8545] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 81.454254][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 81.477857][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 81.496929][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 81.511035][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 81.527353][ T8547] device veth0_macvtap entered promiscuous mode [ 81.544786][ T8564] device veth0_vlan entered promiscuous mode [ 81.571737][ T8547] device veth1_macvtap entered promiscuous mode [ 81.594031][ T8545] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.603768][ T8545] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.613207][ T8545] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.622568][ T8545] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.646916][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 81.666713][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 81.683325][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 81.697175][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 19:40:02 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000880)={r6, r3}) r8 = perf_event_open$cgroup(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x20, 0x5, 0x5, 0x0, 0x2, 0x4c18b, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000940), 0x2}, 0x0, 0x0, 0x7, 0x9, 0x9, 0x8000, 0x6}, r3, 0x5, r3, 0x4) perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x64, 0x87, 0x4a, 0x3, 0x0, 0x7fffffff, 0x10, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x6}, 0x0, 0xffff, 0x23, 0x7, 0xcc, 0x8}, 0xffffffffffffffff, 0x7, r8, 0x9) ioctl$TUNSETLINK(r7, 0x400454cd, 0x338) r9 = openat$cgroup(r3, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r9, &(0x7f0000000a40)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000a80)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0xffffffffffffffff) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) [ 81.733916][ T8564] device veth1_vlan entered promiscuous mode [ 81.768884][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.791372][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.801454][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.813277][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.823913][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.840846][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.853030][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.864608][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.880117][ T8547] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 81.934582][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 81.954432][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 81.973797][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 81.993415][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 82.089273][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 82.110094][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.129970][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 82.141103][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.164371][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 82.186578][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.200728][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 82.217974][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.229636][ T8547] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 82.247919][ T8564] device veth0_macvtap entered promiscuous mode [ 82.268578][ T8564] device veth1_macvtap entered promiscuous mode [ 82.285050][ T409] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.297346][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 82.307939][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 82.311204][ T409] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.324787][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 82.326067][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 82.343868][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 82.353711][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 82.384186][ T8547] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.408317][ T8547] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.424096][ T8547] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.432997][ T8547] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.487709][ T409] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.496087][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 82.496191][ T409] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.546183][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 82.568942][ T8564] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 82.581786][ T8564] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.600451][ T8564] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 82.611177][ T8564] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.621272][ T8564] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 82.633782][ T8564] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.643809][ T8564] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 82.654334][ T8564] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.665910][ T8564] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 82.676847][ T8564] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.688149][ T8564] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 82.698075][ T27] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.718839][ T27] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.723142][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 82.745617][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 82.757974][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 82.770873][ T8564] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 82.783966][ T8564] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.798750][ T8564] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 82.811661][ T8564] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.822863][ T8564] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 82.853340][ T8564] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.878884][ T8564] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 82.891142][ T8564] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.905094][ T8564] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 82.922769][ T8564] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.941505][ T8564] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 82.975790][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 82.997406][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 83.020906][ T8564] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.030315][ T8564] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.039991][ T8564] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.049341][ T8564] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.159898][ T409] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 83.173075][ T27] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 83.177432][ T409] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 83.202936][ T27] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 83.215075][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 83.224743][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 83.334070][ T27] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 83.364714][ T27] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 83.404208][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 83.422280][ T27] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 83.438908][ T27] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 83.451002][ T409] BUG: sleeping function called from invalid context at net/mac80211/sta_info.c:1962 [ 83.471964][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 83.479587][ T409] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 409, name: kworker/u4:7 [ 83.479640][ T409] 4 locks held by kworker/u4:7/409: [ 83.479647][ T409] #0: ffff888023516938 ((wq_completion)phy11){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 83.586866][ T455] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 83.595754][ T409] #1: ffffc9000245fda8 ((work_completion)(&sdata->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 19:40:03 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000006c0)={'wg1\x00'}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000740)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid\x00') bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, r4, 0x19}, 0x10) [ 83.595817][ T409] #2: ffff88804e3b4d00 ( [ 83.634768][ T455] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 19:40:04 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x56, 0x800, 0x800, 0x804, r4, 0x800, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) r5 = openat$cgroup_ro(r0, &(0x7f0000000300)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000340)) openat$cgroup_freezer_state(r5, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={r5, &(0x7f00000003c0)="d47b7bac"}, 0x20) openat$cgroup_type(r4, &(0x7f0000000440)='cgroup.type\x00', 0x2, 0x0) 19:40:04 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000880)={r6, r3}) r8 = perf_event_open$cgroup(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x20, 0x5, 0x5, 0x0, 0x2, 0x4c18b, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000940), 0x2}, 0x0, 0x0, 0x7, 0x9, 0x9, 0x8000, 0x6}, r3, 0x5, r3, 0x4) perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x64, 0x87, 0x4a, 0x3, 0x0, 0x7fffffff, 0x10, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x6}, 0x0, 0xffff, 0x23, 0x7, 0xcc, 0x8}, 0xffffffffffffffff, 0x7, r8, 0x9) ioctl$TUNSETLINK(r7, 0x400454cd, 0x338) r9 = openat$cgroup(r3, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r9, &(0x7f0000000a40)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000a80)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0xffffffffffffffff) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) [ 83.692594][ T409] &wdev->mtx){+.+.}-{3:3}, at: ieee80211_ibss_work+0x93/0xe80 [ 83.710872][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 83.748560][ T409] #3: ffffffff8b3372a0 (rcu_read_lock){....}-{1:2}, at: sta_info_insert_rcu+0x680/0x2ba0 [ 83.783144][ T409] Preemption disabled at: [ 83.783201][ T409] [] __mutex_lock+0x10f/0x10e0 [ 83.840500][ T409] CPU: 0 PID: 409 Comm: kworker/u4:7 Not tainted 5.10.0-rc3-syzkaller #0 [ 83.849292][ T409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.859557][ T409] Workqueue: phy11 ieee80211_iface_work [ 83.865299][ T409] Call Trace: [ 83.868789][ T409] dump_stack+0x107/0x163 [ 83.873275][ T409] ? __mutex_lock+0x10f/0x10e0 [ 83.878057][ T409] ___might_sleep.cold+0x1e8/0x22e [ 83.883194][ T409] sta_info_move_state+0x32/0x8d0 [ 83.888250][ T409] sta_info_free+0x65/0x3b0 [ 83.893213][ T409] sta_info_insert_rcu+0x303/0x2ba0 [ 83.898434][ T409] ? find_held_lock+0x2d/0x110 [ 83.903224][ T409] ? rate_control_rate_init+0x32c/0x6a0 [ 83.908887][ T409] ? sta_info_free+0x3b0/0x3b0 [ 83.914044][ T409] ? __local_bh_enable_ip+0x9c/0x110 [ 83.919380][ T409] ? rate_control_rate_init+0x35f/0x6a0 [ 83.925044][ T409] ieee80211_ibss_finish_sta+0x212/0x390 [ 83.931817][ T409] ? ieee80211_ibss_build_presp+0x15f0/0x15f0 [ 83.937961][ T409] ? __local_bh_enable_ip+0x9c/0x110 [ 83.943410][ T409] ieee80211_ibss_work+0x2c7/0xe80 [ 83.948536][ T409] ? ieee80211_ibss_rx_queued_mgmt+0x1870/0x1870 [ 83.955119][ T409] ? mark_held_locks+0x9f/0xe0 [ 83.959895][ T409] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 83.965724][ T409] ? lockdep_hardirqs_on+0x79/0x100 [ 83.971165][ T409] ? _raw_spin_unlock_irqrestore+0x2f/0x50 [ 83.976991][ T409] ieee80211_iface_work+0x91f/0xa90 [ 83.982345][ T409] process_one_work+0x933/0x15a0 19:40:04 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) write$cgroup_int(r0, &(0x7f000002b1c0)=0x6df2, 0x12) r6 = openat$cgroup(r5, &(0x7f000002b200)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f000002b240)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f000002b280)={0xd9a}, 0x8) openat$cgroup_netprio_ifpriomap(r6, &(0x7f000002b2c0)='net_prio.ifpriomap\x00', 0x2, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f000002b300)={r5}, 0x8) openat$cgroup_type(r7, &(0x7f000002b340)='cgroup.type\x00', 0x2, 0x0) gettid() openat$cgroup_subtree(r7, &(0x7f000002b380)='cgroup.subtree_control\x00', 0x2, 0x0) 19:40:04 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r5}, 0x8) ioctl$TUNSETLINK(r6, 0x400454cd, 0x203) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x18, 0x7, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @generic={0x81, 0xe, 0x1, 0x4094, 0xecc}]}, &(0x7f0000000d80)='GPL\x00', 0x200, 0x1000, &(0x7f0000000dc0)=""/4096, 0x41000, 0x12, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000001e00)={0x3, 0x9, 0x3ff, 0x5}, 0x10}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001ec0)={&(0x7f0000000d00)='./file0\x00', r7}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/net/tun\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002080)={0x19, 0xa, &(0x7f0000001f40)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9a}, @generic={0x1f, 0x4, 0x7, 0x0, 0x9}, @generic={0x81, 0x7, 0xf, 0x7c, 0xfff}, @alu={0x4, 0x1, 0x0, 0x1, 0x7, 0x100, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x8f}, @call={0x85, 0x0, 0x0, 0x94}, @generic={0x4, 0xf, 0xb, 0xffff, 0x9}], &(0x7f0000001fc0)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x40f00, 0x4, [], 0x0, 0x19, r0, 0x8, &(0x7f0000002000)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002040)={0x3, 0xd, 0x6, 0x2800000}, 0x10, 0xffffffffffffffff, r1}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000003380)={&(0x7f0000002100)="13fa12d2944cfbad3673888b915b08bea2be0162d7ee91b2f60125f5457c810bf3b7ae3beb9b3888b2f7291838c8081c95d60e2aa6e4517b31ccfcff60617171afab26ffbe2e4256b0679a7f4ba4ec1c16fd772a199838f52f3e12db024bc19c4204a9f5f19250497dc0a35158d8fe8690927f23c00bff858b39f7ea07ef558302119334c459ff65a8440cb19001b43ac3f5656160b34eb9e0a67277baeba1c249660ac44a91f50efc94fe5a717060d400cd3529982b45abf0ecfa76c19a9119801a57e764c97c7a08645b243b", &(0x7f0000002200)=""/4096, &(0x7f0000003200)="039386fd7c7b52626ce1861d6b4bec357966a020cfcf7199b17ed792b1604d7bbe821102da64dc3344436d77a0eff1bcfd89e938aedc36e703878f929304d49e863e21a993c40b92f2e40f75e22e167c76f4fa256c25f520d343ff19e16cb3ca07f08ea78e53a683d8548c4a9068fc78746ff7cbdda1a97761792779ebe7c053b39ab36422acf5d1be631c8561bf5cba71b62e24bbb3e42f01bfa3219efced1a6e73c94c10fc437c637331d67c4b89132b22d9d772488b5a36659208480b731d9e85524f2779ee", &(0x7f0000003300)="71108b207250c076979bfab99c9f57fc9944cae27b658e25556bb5256f93b75ef4ba1b9a5923e40a7293ed9bfcb7d0584092a60b76abd8b20003772f1d54f85cf26dace6ae03923a", 0x2, 0x1, 0x4}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000003540)={0x1, &(0x7f00000033c0)="aed5459da70360423fcd425656affd573e8e02ce55eef8decd048e1272640e3d6d6150bd3f8066ac5e50f1e258a49b27e6b4eb0d3bd00f45d2db8abcac899b2137c0118f4cfda117286ffcad2c0e7e9e4aebf094d2a06248f034a1cf2fb39f65076813c1f48ce6f992e80095609b953481631a6cdb281fc0bf916048e01bbcd8da747e40af1455ab28050aac51fe08265bb52b7c4e6c5359b4ba107454093e458aba97d603b7f43273dbcdc8a9ff8e146d0892348d2788979d6a59ae8ccb38cc78a2a2bd3587ce", &(0x7f00000034c0)=""/87}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) write$cgroup_int(r6, &(0x7f00000035c0)=0x5, 0x12) 19:40:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup(r3, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r6, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r7, r3, 0x11}, 0x10) write$cgroup_int(r3, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r6}, 0x8) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, r10, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r2, r11}, 0x78) 19:40:04 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x56, 0x800, 0x800, 0x804, r4, 0x800, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) r5 = openat$cgroup_ro(r0, &(0x7f0000000300)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000340)) openat$cgroup_freezer_state(r5, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={r5, &(0x7f00000003c0)="d47b7bac"}, 0x20) openat$cgroup_type(r4, &(0x7f0000000440)='cgroup.type\x00', 0x2, 0x0) 19:40:04 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000006c0)={'wg1\x00'}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000740)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, r4, 0x19}, 0x10) 19:40:04 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000880)={r6, r3}) r8 = perf_event_open$cgroup(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x20, 0x5, 0x5, 0x0, 0x2, 0x4c18b, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000940), 0x2}, 0x0, 0x0, 0x7, 0x9, 0x9, 0x8000, 0x6}, r3, 0x5, r3, 0x4) perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x64, 0x87, 0x4a, 0x3, 0x0, 0x7fffffff, 0x10, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x6}, 0x0, 0xffff, 0x23, 0x7, 0xcc, 0x8}, 0xffffffffffffffff, 0x7, r8, 0x9) ioctl$TUNSETLINK(r7, 0x400454cd, 0x338) r9 = openat$cgroup(r3, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r9, &(0x7f0000000a40)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000a80)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0xffffffffffffffff) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) [ 83.987401][ T409] ? lock_release+0x710/0x710 [ 83.992094][ T409] ? pwq_dec_nr_in_flight+0x320/0x320 [ 83.997485][ T409] ? rwlock_bug.part.0+0x90/0x90 [ 84.002435][ T409] ? _raw_spin_lock_irq+0x41/0x50 [ 84.007573][ T409] worker_thread+0x64c/0x1120 [ 84.012296][ T409] ? process_one_work+0x15a0/0x15a0 [ 84.017519][ T409] kthread+0x3af/0x4a0 [ 84.021620][ T409] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 84.027533][ T409] ret_from_fork+0x1f/0x30 19:40:04 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000006c0)={'wg1\x00'}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, r4, 0x19}, 0x10) 19:40:04 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) write$cgroup_int(r0, &(0x7f000002b1c0)=0x6df2, 0x12) r6 = openat$cgroup(r5, &(0x7f000002b200)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f000002b240)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f000002b280)={0xd9a}, 0x8) openat$cgroup_netprio_ifpriomap(r6, &(0x7f000002b2c0)='net_prio.ifpriomap\x00', 0x2, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f000002b300)={r5}, 0x8) openat$cgroup_type(r7, &(0x7f000002b340)='cgroup.type\x00', 0x2, 0x0) gettid() openat$cgroup_subtree(r7, &(0x7f000002b380)='cgroup.subtree_control\x00', 0x2, 0x0) 19:40:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup(r3, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r6, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r7, r3, 0x11}, 0x10) write$cgroup_int(r3, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r6}, 0x8) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, r10, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r2, r11}, 0x78) 19:40:04 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r5}, 0x8) ioctl$TUNSETLINK(r6, 0x400454cd, 0x203) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x18, 0x7, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @generic={0x81, 0xe, 0x1, 0x4094, 0xecc}]}, &(0x7f0000000d80)='GPL\x00', 0x200, 0x1000, &(0x7f0000000dc0)=""/4096, 0x41000, 0x12, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000001e00)={0x3, 0x9, 0x3ff, 0x5}, 0x10}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001ec0)={&(0x7f0000000d00)='./file0\x00', r7}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/net/tun\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002080)={0x19, 0xa, &(0x7f0000001f40)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9a}, @generic={0x1f, 0x4, 0x7, 0x0, 0x9}, @generic={0x81, 0x7, 0xf, 0x7c, 0xfff}, @alu={0x4, 0x1, 0x0, 0x1, 0x7, 0x100, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x8f}, @call={0x85, 0x0, 0x0, 0x94}, @generic={0x4, 0xf, 0xb, 0xffff, 0x9}], &(0x7f0000001fc0)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x40f00, 0x4, [], 0x0, 0x19, r0, 0x8, &(0x7f0000002000)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002040)={0x3, 0xd, 0x6, 0x2800000}, 0x10, 0xffffffffffffffff, r1}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000003380)={&(0x7f0000002100)="13fa12d2944cfbad3673888b915b08bea2be0162d7ee91b2f60125f5457c810bf3b7ae3beb9b3888b2f7291838c8081c95d60e2aa6e4517b31ccfcff60617171afab26ffbe2e4256b0679a7f4ba4ec1c16fd772a199838f52f3e12db024bc19c4204a9f5f19250497dc0a35158d8fe8690927f23c00bff858b39f7ea07ef558302119334c459ff65a8440cb19001b43ac3f5656160b34eb9e0a67277baeba1c249660ac44a91f50efc94fe5a717060d400cd3529982b45abf0ecfa76c19a9119801a57e764c97c7a08645b243b", &(0x7f0000002200)=""/4096, &(0x7f0000003200)="039386fd7c7b52626ce1861d6b4bec357966a020cfcf7199b17ed792b1604d7bbe821102da64dc3344436d77a0eff1bcfd89e938aedc36e703878f929304d49e863e21a993c40b92f2e40f75e22e167c76f4fa256c25f520d343ff19e16cb3ca07f08ea78e53a683d8548c4a9068fc78746ff7cbdda1a97761792779ebe7c053b39ab36422acf5d1be631c8561bf5cba71b62e24bbb3e42f01bfa3219efced1a6e73c94c10fc437c637331d67c4b89132b22d9d772488b5a36659208480b731d9e85524f2779ee", &(0x7f0000003300)="71108b207250c076979bfab99c9f57fc9944cae27b658e25556bb5256f93b75ef4ba1b9a5923e40a7293ed9bfcb7d0584092a60b76abd8b20003772f1d54f85cf26dace6ae03923a", 0x2, 0x1, 0x4}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000003540)={0x1, &(0x7f00000033c0)="aed5459da70360423fcd425656affd573e8e02ce55eef8decd048e1272640e3d6d6150bd3f8066ac5e50f1e258a49b27e6b4eb0d3bd00f45d2db8abcac899b2137c0118f4cfda117286ffcad2c0e7e9e4aebf094d2a06248f034a1cf2fb39f65076813c1f48ce6f992e80095609b953481631a6cdb281fc0bf916048e01bbcd8da747e40af1455ab28050aac51fe08265bb52b7c4e6c5359b4ba107454093e458aba97d603b7f43273dbcdc8a9ff8e146d0892348d2788979d6a59ae8ccb38cc78a2a2bd3587ce", &(0x7f00000034c0)=""/87}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) write$cgroup_int(r6, &(0x7f00000035c0)=0x5, 0x12) 19:40:04 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x56, 0x800, 0x800, 0x804, r4, 0x800, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) r5 = openat$cgroup_ro(r0, &(0x7f0000000300)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000340)) openat$cgroup_freezer_state(r5, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={r5, &(0x7f00000003c0)="d47b7bac"}, 0x20) openat$cgroup_type(r4, &(0x7f0000000440)='cgroup.type\x00', 0x2, 0x0) [ 84.306877][ T409] [ 84.309258][ T409] ============================= [ 84.314101][ T409] [ BUG: Invalid wait context ] [ 84.318976][ T409] 5.10.0-rc3-syzkaller #0 Tainted: G W [ 84.325774][ T409] ----------------------------- [ 84.330662][ T409] kworker/u4:7/409 is trying to lock: [ 84.336032][ T409] ffff88804e38a9d0 (&local->chanctx_mtx){+.+.}-{3:3}, at: ieee80211_recalc_min_chandef+0x49/0x140 [ 84.346677][ T409] other info that might help us debug this: [ 84.352697][ T409] context-{4:4} [ 84.356243][ T409] 4 locks held by kworker/u4:7/409: [ 84.361905][ T409] #0: ffff888023516938 ((wq_completion)phy11){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 84.372277][ T409] #1: ffffc9000245fda8 ((work_completion)(&sdata->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 84.383666][ T409] #2: ffff88804e3b4d00 (&wdev->mtx){+.+.}-{3:3}, at: ieee80211_ibss_work+0x93/0xe80 [ 84.393170][ T409] #3: ffffffff8b3372a0 (rcu_read_lock){....}-{1:2}, at: sta_info_insert_rcu+0x680/0x2ba0 [ 84.403425][ T409] stack backtrace: [ 84.407273][ T409] CPU: 1 PID: 409 Comm: kworker/u4:7 Tainted: G W 5.10.0-rc3-syzkaller #0 [ 84.417184][ T409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.427371][ T409] Workqueue: phy11 ieee80211_iface_work [ 84.432954][ T409] Call Trace: [ 84.436255][ T409] dump_stack+0x107/0x163 [ 84.440600][ T409] __lock_acquire.cold+0x310/0x3a2 [ 84.445745][ T409] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 84.451782][ T409] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 84.457863][ T409] lock_acquire+0x2a3/0x8c0 [ 84.462387][ T409] ? ieee80211_recalc_min_chandef+0x49/0x140 [ 84.468379][ T409] ? lock_release+0x710/0x710 [ 84.473073][ T409] __mutex_lock+0x134/0x10e0 [ 84.477710][ T409] ? ieee80211_recalc_min_chandef+0x49/0x140 [ 84.483704][ T409] ? ieee80211_recalc_min_chandef+0x49/0x140 [ 84.489787][ T409] ? mutex_lock_io_nested+0xf60/0xf60 [ 84.495196][ T409] ? ieee80211_clear_fast_rx+0x58/0x80 [ 84.500677][ T409] ? mark_held_locks+0x9f/0xe0 [ 84.505573][ T409] ieee80211_recalc_min_chandef+0x49/0x140 [ 84.511582][ T409] sta_info_move_state+0x3cf/0x8d0 [ 84.516723][ T409] sta_info_free+0x65/0x3b0 [ 84.521236][ T409] sta_info_insert_rcu+0x303/0x2ba0 [ 84.526447][ T409] ? find_held_lock+0x2d/0x110 [ 84.531220][ T409] ? rate_control_rate_init+0x32c/0x6a0 [ 84.536832][ T409] ? sta_info_free+0x3b0/0x3b0 [ 84.541698][ T409] ? __local_bh_enable_ip+0x9c/0x110 [ 84.546995][ T409] ? rate_control_rate_init+0x35f/0x6a0 [ 84.552552][ T409] ieee80211_ibss_finish_sta+0x212/0x390 [ 84.558220][ T409] ? ieee80211_ibss_build_presp+0x15f0/0x15f0 [ 84.564335][ T409] ? __local_bh_enable_ip+0x9c/0x110 [ 84.569787][ T409] ieee80211_ibss_work+0x2c7/0xe80 [ 84.575005][ T409] ? ieee80211_ibss_rx_queued_mgmt+0x1870/0x1870 [ 84.581617][ T409] ? mark_held_locks+0x9f/0xe0 [ 84.586399][ T409] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 84.592359][ T409] ? lockdep_hardirqs_on+0x79/0x100 [ 84.597576][ T409] ? _raw_spin_unlock_irqrestore+0x2f/0x50 19:40:04 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000880)={r6, r3}) r8 = perf_event_open$cgroup(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x20, 0x5, 0x5, 0x0, 0x2, 0x4c18b, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000940), 0x2}, 0x0, 0x0, 0x7, 0x9, 0x9, 0x8000, 0x6}, r3, 0x5, r3, 0x4) perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x64, 0x87, 0x4a, 0x3, 0x0, 0x7fffffff, 0x10, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x6}, 0x0, 0xffff, 0x23, 0x7, 0xcc, 0x8}, 0xffffffffffffffff, 0x7, r8, 0x9) ioctl$TUNSETLINK(r7, 0x400454cd, 0x338) r9 = openat$cgroup(r3, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r9, &(0x7f0000000a40)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000a80)) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:40:04 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000006c0)={'wg1\x00'}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, r4, 0x19}, 0x10) 19:40:04 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) write$cgroup_int(r0, &(0x7f000002b1c0)=0x6df2, 0x12) r6 = openat$cgroup(r5, &(0x7f000002b200)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f000002b240)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f000002b280)={0xd9a}, 0x8) openat$cgroup_netprio_ifpriomap(r6, &(0x7f000002b2c0)='net_prio.ifpriomap\x00', 0x2, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f000002b300)={r5}, 0x8) openat$cgroup_type(r7, &(0x7f000002b340)='cgroup.type\x00', 0x2, 0x0) gettid() openat$cgroup_subtree(r7, &(0x7f000002b380)='cgroup.subtree_control\x00', 0x2, 0x0) 19:40:04 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x56, 0x800, 0x800, 0x804, r4, 0x800, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) r5 = openat$cgroup_ro(r0, &(0x7f0000000300)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000340)) openat$cgroup_freezer_state(r5, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={r5, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:04 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r3}, 0x78) write$cgroup_subtree(r0, &(0x7f0000000680)={[{0x2b, 'pids'}, {0xd2a2034c3d2da6d6, 'cpu'}, {0x2d, 'rdma'}]}, 0x11) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, r4, 0x19}, 0x10) 19:40:04 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) write$cgroup_int(r0, &(0x7f000002b1c0)=0x6df2, 0x12) r6 = openat$cgroup(r5, &(0x7f000002b200)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f000002b240)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f000002b280)={0xd9a}, 0x8) openat$cgroup_netprio_ifpriomap(r6, &(0x7f000002b2c0)='net_prio.ifpriomap\x00', 0x2, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f000002b300)={r5}, 0x8) openat$cgroup_type(r7, &(0x7f000002b340)='cgroup.type\x00', 0x2, 0x0) gettid() 19:40:04 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x56, 0x800, 0x800, 0x804, r4, 0x800, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) r5 = openat$cgroup_ro(r0, &(0x7f0000000300)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000340)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={r5, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:04 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r1}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x5, &(0x7f0000000240)=@raw=[@generic={0x1, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0xb, 0x8, 0x4, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x30, 0x45, &(0x7f00000002c0)=""/69, 0x40f00, 0x4, [], 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0x10, 0x9, 0xea95}, 0x10, r2}, 0x78) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, r3, 0x19}, 0x10) 19:40:04 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) write$cgroup_int(r0, &(0x7f000002b1c0)=0x6df2, 0x12) r6 = openat$cgroup(r5, &(0x7f000002b200)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f000002b240)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f000002b280)={0xd9a}, 0x8) openat$cgroup_netprio_ifpriomap(r6, &(0x7f000002b2c0)='net_prio.ifpriomap\x00', 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f000002b300)={r5}, 0x8) gettid() [ 84.603574][ T409] ieee80211_iface_work+0x91f/0xa90 [ 84.608904][ T409] process_one_work+0x933/0x15a0 [ 84.613961][ T409] ? lock_release+0x710/0x710 [ 84.618710][ T409] ? pwq_dec_nr_in_flight+0x320/0x320 [ 84.624101][ T409] ? rwlock_bug.part.0+0x90/0x90 [ 84.629069][ T409] ? _raw_spin_lock_irq+0x41/0x50 [ 84.634101][ T409] worker_thread+0x64c/0x1120 [ 84.638814][ T409] ? process_one_work+0x15a0/0x15a0 [ 84.644021][ T409] kthread+0x3af/0x4a0 [ 84.648224][ T409] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 84.654122][ T409] ret_from_fork+0x1f/0x30 19:40:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup(r3, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r6, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r7, r3, 0x11}, 0x10) write$cgroup_int(r3, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r6}, 0x8) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, r10, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r2, r11}, 0x78) 19:40:05 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r5}, 0x8) ioctl$TUNSETLINK(r6, 0x400454cd, 0x203) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x18, 0x7, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @generic={0x81, 0xe, 0x1, 0x4094, 0xecc}]}, &(0x7f0000000d80)='GPL\x00', 0x200, 0x1000, &(0x7f0000000dc0)=""/4096, 0x41000, 0x12, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000001e00)={0x3, 0x9, 0x3ff, 0x5}, 0x10}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001ec0)={&(0x7f0000000d00)='./file0\x00', r7}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/net/tun\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002080)={0x19, 0xa, &(0x7f0000001f40)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9a}, @generic={0x1f, 0x4, 0x7, 0x0, 0x9}, @generic={0x81, 0x7, 0xf, 0x7c, 0xfff}, @alu={0x4, 0x1, 0x0, 0x1, 0x7, 0x100, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x8f}, @call={0x85, 0x0, 0x0, 0x94}, @generic={0x4, 0xf, 0xb, 0xffff, 0x9}], &(0x7f0000001fc0)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x40f00, 0x4, [], 0x0, 0x19, r0, 0x8, &(0x7f0000002000)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002040)={0x3, 0xd, 0x6, 0x2800000}, 0x10, 0xffffffffffffffff, r1}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000003380)={&(0x7f0000002100)="13fa12d2944cfbad3673888b915b08bea2be0162d7ee91b2f60125f5457c810bf3b7ae3beb9b3888b2f7291838c8081c95d60e2aa6e4517b31ccfcff60617171afab26ffbe2e4256b0679a7f4ba4ec1c16fd772a199838f52f3e12db024bc19c4204a9f5f19250497dc0a35158d8fe8690927f23c00bff858b39f7ea07ef558302119334c459ff65a8440cb19001b43ac3f5656160b34eb9e0a67277baeba1c249660ac44a91f50efc94fe5a717060d400cd3529982b45abf0ecfa76c19a9119801a57e764c97c7a08645b243b", &(0x7f0000002200)=""/4096, &(0x7f0000003200)="039386fd7c7b52626ce1861d6b4bec357966a020cfcf7199b17ed792b1604d7bbe821102da64dc3344436d77a0eff1bcfd89e938aedc36e703878f929304d49e863e21a993c40b92f2e40f75e22e167c76f4fa256c25f520d343ff19e16cb3ca07f08ea78e53a683d8548c4a9068fc78746ff7cbdda1a97761792779ebe7c053b39ab36422acf5d1be631c8561bf5cba71b62e24bbb3e42f01bfa3219efced1a6e73c94c10fc437c637331d67c4b89132b22d9d772488b5a36659208480b731d9e85524f2779ee", &(0x7f0000003300)="71108b207250c076979bfab99c9f57fc9944cae27b658e25556bb5256f93b75ef4ba1b9a5923e40a7293ed9bfcb7d0584092a60b76abd8b20003772f1d54f85cf26dace6ae03923a", 0x2, 0x1, 0x4}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000003540)={0x1, &(0x7f00000033c0)="aed5459da70360423fcd425656affd573e8e02ce55eef8decd048e1272640e3d6d6150bd3f8066ac5e50f1e258a49b27e6b4eb0d3bd00f45d2db8abcac899b2137c0118f4cfda117286ffcad2c0e7e9e4aebf094d2a06248f034a1cf2fb39f65076813c1f48ce6f992e80095609b953481631a6cdb281fc0bf916048e01bbcd8da747e40af1455ab28050aac51fe08265bb52b7c4e6c5359b4ba107454093e458aba97d603b7f43273dbcdc8a9ff8e146d0892348d2788979d6a59ae8ccb38cc78a2a2bd3587ce", &(0x7f00000034c0)=""/87}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) write$cgroup_int(r6, &(0x7f00000035c0)=0x5, 0x12) 19:40:05 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x56, 0x800, 0x800, 0x804, r4, 0x800, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) r5 = openat$cgroup_ro(r0, &(0x7f0000000300)='memory.swap.current\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={r5, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:05 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000880)={r6, r3}) r8 = perf_event_open$cgroup(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x20, 0x5, 0x5, 0x0, 0x2, 0x4c18b, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000940), 0x2}, 0x0, 0x0, 0x7, 0x9, 0x9, 0x8000, 0x6}, r3, 0x5, r3, 0x4) perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x64, 0x87, 0x4a, 0x3, 0x0, 0x7fffffff, 0x10, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x6}, 0x0, 0xffff, 0x23, 0x7, 0xcc, 0x8}, 0xffffffffffffffff, 0x7, r8, 0x9) ioctl$TUNSETLINK(r7, 0x400454cd, 0x338) r9 = openat$cgroup(r3, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r9, &(0x7f0000000a40)='net_prio.prioidx\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:40:05 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) write$cgroup_int(r0, &(0x7f000002b1c0)=0x6df2, 0x12) r6 = openat$cgroup(r5, &(0x7f000002b200)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f000002b240)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f000002b280)={0xd9a}, 0x8) openat$cgroup_netprio_ifpriomap(r6, &(0x7f000002b2c0)='net_prio.ifpriomap\x00', 0x2, 0x0) gettid() [ 84.736077][ T409] BUG: sleeping function called from invalid context at net/mac80211/sta_info.c:1962 [ 84.749495][ T409] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 409, name: kworker/u4:7 19:40:05 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r1}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x636e, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000440)={0x5, 0x4, 0x5, 0x2}, &(0x7f0000000480)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x3}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, 0xffffffffffffffff, 0x19}, 0x10) 19:40:05 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x56, 0x800, 0x800, 0x804, r4, 0x800, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) [ 84.785716][ T409] INFO: lockdep is turned off. 19:40:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r5, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r6, r2, 0x11}, 0x10) write$cgroup_int(r2, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r5}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r2}, 0x78) [ 84.813012][ T409] Preemption disabled at: [ 84.813039][ T409] [] preempt_schedule_thunk+0x16/0x18 [ 84.853165][ T409] CPU: 1 PID: 409 Comm: kworker/u4:7 Tainted: G W 5.10.0-rc3-syzkaller #0 19:40:05 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r5}, 0x8) ioctl$TUNSETLINK(r6, 0x400454cd, 0x203) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x18, 0x7, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @generic={0x81, 0xe, 0x1, 0x4094, 0xecc}]}, &(0x7f0000000d80)='GPL\x00', 0x200, 0x1000, &(0x7f0000000dc0)=""/4096, 0x41000, 0x12, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000001e00)={0x3, 0x9, 0x3ff, 0x5}, 0x10}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001ec0)={&(0x7f0000000d00)='./file0\x00', r7}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/net/tun\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002080)={0x19, 0xa, &(0x7f0000001f40)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9a}, @generic={0x1f, 0x4, 0x7, 0x0, 0x9}, @generic={0x81, 0x7, 0xf, 0x7c, 0xfff}, @alu={0x4, 0x1, 0x0, 0x1, 0x7, 0x100, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x8f}, @call={0x85, 0x0, 0x0, 0x94}, @generic={0x4, 0xf, 0xb, 0xffff, 0x9}], &(0x7f0000001fc0)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x40f00, 0x4, [], 0x0, 0x19, r0, 0x8, &(0x7f0000002000)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002040)={0x3, 0xd, 0x6, 0x2800000}, 0x10, 0xffffffffffffffff, r1}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000003380)={&(0x7f0000002100)="13fa12d2944cfbad3673888b915b08bea2be0162d7ee91b2f60125f5457c810bf3b7ae3beb9b3888b2f7291838c8081c95d60e2aa6e4517b31ccfcff60617171afab26ffbe2e4256b0679a7f4ba4ec1c16fd772a199838f52f3e12db024bc19c4204a9f5f19250497dc0a35158d8fe8690927f23c00bff858b39f7ea07ef558302119334c459ff65a8440cb19001b43ac3f5656160b34eb9e0a67277baeba1c249660ac44a91f50efc94fe5a717060d400cd3529982b45abf0ecfa76c19a9119801a57e764c97c7a08645b243b", &(0x7f0000002200)=""/4096, &(0x7f0000003200)="039386fd7c7b52626ce1861d6b4bec357966a020cfcf7199b17ed792b1604d7bbe821102da64dc3344436d77a0eff1bcfd89e938aedc36e703878f929304d49e863e21a993c40b92f2e40f75e22e167c76f4fa256c25f520d343ff19e16cb3ca07f08ea78e53a683d8548c4a9068fc78746ff7cbdda1a97761792779ebe7c053b39ab36422acf5d1be631c8561bf5cba71b62e24bbb3e42f01bfa3219efced1a6e73c94c10fc437c637331d67c4b89132b22d9d772488b5a36659208480b731d9e85524f2779ee", &(0x7f0000003300)="71108b207250c076979bfab99c9f57fc9944cae27b658e25556bb5256f93b75ef4ba1b9a5923e40a7293ed9bfcb7d0584092a60b76abd8b20003772f1d54f85cf26dace6ae03923a", 0x2, 0x1, 0x4}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000003540)={0x1, &(0x7f00000033c0)="aed5459da70360423fcd425656affd573e8e02ce55eef8decd048e1272640e3d6d6150bd3f8066ac5e50f1e258a49b27e6b4eb0d3bd00f45d2db8abcac899b2137c0118f4cfda117286ffcad2c0e7e9e4aebf094d2a06248f034a1cf2fb39f65076813c1f48ce6f992e80095609b953481631a6cdb281fc0bf916048e01bbcd8da747e40af1455ab28050aac51fe08265bb52b7c4e6c5359b4ba107454093e458aba97d603b7f43273dbcdc8a9ff8e146d0892348d2788979d6a59ae8ccb38cc78a2a2bd3587ce", &(0x7f00000034c0)=""/87}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:05 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r1}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0xa) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, 0xffffffffffffffff, 0x19}, 0x10) 19:40:05 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) write$cgroup_int(r0, &(0x7f000002b1c0)=0x6df2, 0x12) r6 = openat$cgroup(r5, &(0x7f000002b200)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f000002b240)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f000002b280)={0xd9a}, 0x8) gettid() [ 84.863221][ T409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.873483][ T409] Workqueue: phy11 ieee80211_iface_work [ 84.879036][ T409] Call Trace: [ 84.882338][ T409] dump_stack+0x107/0x163 [ 84.886794][ T409] ? preempt_schedule_thunk+0x16/0x18 [ 84.893046][ T409] ___might_sleep.cold+0x1e8/0x22e [ 84.898702][ T409] sta_info_move_state+0x32/0x8d0 [ 84.903839][ T409] sta_info_free+0x65/0x3b0 19:40:05 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) close(r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) [ 84.908627][ T409] sta_info_insert_rcu+0x303/0x2ba0 [ 84.913923][ T409] ? find_held_lock+0x2d/0x110 [ 84.918720][ T409] ? rate_control_rate_init+0x32c/0x6a0 [ 84.924856][ T409] ? sta_info_free+0x3b0/0x3b0 [ 84.930358][ T409] ? __local_bh_enable_ip+0x9c/0x110 [ 84.935790][ T409] ? rate_control_rate_init+0x35f/0x6a0 [ 84.942876][ T409] ieee80211_ibss_finish_sta+0x212/0x390 [ 84.948890][ T409] ? ieee80211_ibss_build_presp+0x15f0/0x15f0 [ 84.955003][ T409] ? __local_bh_enable_ip+0x9c/0x110 [ 84.960306][ T409] ieee80211_ibss_work+0x2c7/0xe80 [ 84.965627][ T409] ? ieee80211_ibss_rx_queued_mgmt+0x1870/0x1870 [ 84.971974][ T409] ? mark_held_locks+0x9f/0xe0 [ 84.976756][ T409] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 84.982576][ T409] ? lockdep_hardirqs_on+0x79/0x100 [ 84.987786][ T409] ? _raw_spin_unlock_irqrestore+0x2f/0x50 [ 84.993781][ T409] ieee80211_iface_work+0x91f/0xa90 [ 84.999009][ T409] process_one_work+0x933/0x15a0 [ 85.003958][ T409] ? lock_release+0x710/0x710 [ 85.008660][ T409] ? pwq_dec_nr_in_flight+0x320/0x320 19:40:05 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) write$cgroup_int(r0, &(0x7f000002b1c0)=0x6df2, 0x12) r6 = openat$cgroup(r5, &(0x7f000002b200)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f000002b240)='cgroup.procs\x00', 0x2, 0x0) gettid() 19:40:05 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, 0xffffffffffffffff, 0x19}, 0x10) [ 85.014152][ T409] ? rwlock_bug.part.0+0x90/0x90 [ 85.019240][ T409] ? _raw_spin_lock_irq+0x41/0x50 [ 85.024298][ T409] worker_thread+0x64c/0x1120 [ 85.029104][ T409] ? process_one_work+0x15a0/0x15a0 [ 85.034693][ T409] kthread+0x3af/0x4a0 [ 85.038799][ T409] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 85.044840][ T409] ret_from_fork+0x1f/0x30 19:40:05 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:05 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000880)={r6, r3}) r8 = perf_event_open$cgroup(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x20, 0x5, 0x5, 0x0, 0x2, 0x4c18b, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000940), 0x2}, 0x0, 0x0, 0x7, 0x9, 0x9, 0x8000, 0x6}, r3, 0x5, r3, 0x4) perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x64, 0x87, 0x4a, 0x3, 0x0, 0x7fffffff, 0x10, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x6}, 0x0, 0xffff, 0x23, 0x7, 0xcc, 0x8}, 0xffffffffffffffff, 0x7, r8, 0x9) ioctl$TUNSETLINK(r7, 0x400454cd, 0x338) openat$cgroup(r3, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:40:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r5, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r6, r2, 0x11}, 0x10) write$cgroup_int(r2, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r5}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r2}, 0x78) 19:40:05 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r5}, 0x8) ioctl$TUNSETLINK(r6, 0x400454cd, 0x203) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x18, 0x7, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @generic={0x81, 0xe, 0x1, 0x4094, 0xecc}]}, &(0x7f0000000d80)='GPL\x00', 0x200, 0x1000, &(0x7f0000000dc0)=""/4096, 0x41000, 0x12, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000001e00)={0x3, 0x9, 0x3ff, 0x5}, 0x10}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001ec0)={&(0x7f0000000d00)='./file0\x00', r7}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/net/tun\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002080)={0x19, 0xa, &(0x7f0000001f40)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9a}, @generic={0x1f, 0x4, 0x7, 0x0, 0x9}, @generic={0x81, 0x7, 0xf, 0x7c, 0xfff}, @alu={0x4, 0x1, 0x0, 0x1, 0x7, 0x100, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x8f}, @call={0x85, 0x0, 0x0, 0x94}, @generic={0x4, 0xf, 0xb, 0xffff, 0x9}], &(0x7f0000001fc0)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x40f00, 0x4, [], 0x0, 0x19, r0, 0x8, &(0x7f0000002000)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002040)={0x3, 0xd, 0x6, 0x2800000}, 0x10, 0xffffffffffffffff, r1}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000003380)={&(0x7f0000002100)="13fa12d2944cfbad3673888b915b08bea2be0162d7ee91b2f60125f5457c810bf3b7ae3beb9b3888b2f7291838c8081c95d60e2aa6e4517b31ccfcff60617171afab26ffbe2e4256b0679a7f4ba4ec1c16fd772a199838f52f3e12db024bc19c4204a9f5f19250497dc0a35158d8fe8690927f23c00bff858b39f7ea07ef558302119334c459ff65a8440cb19001b43ac3f5656160b34eb9e0a67277baeba1c249660ac44a91f50efc94fe5a717060d400cd3529982b45abf0ecfa76c19a9119801a57e764c97c7a08645b243b", &(0x7f0000002200)=""/4096, &(0x7f0000003200)="039386fd7c7b52626ce1861d6b4bec357966a020cfcf7199b17ed792b1604d7bbe821102da64dc3344436d77a0eff1bcfd89e938aedc36e703878f929304d49e863e21a993c40b92f2e40f75e22e167c76f4fa256c25f520d343ff19e16cb3ca07f08ea78e53a683d8548c4a9068fc78746ff7cbdda1a97761792779ebe7c053b39ab36422acf5d1be631c8561bf5cba71b62e24bbb3e42f01bfa3219efced1a6e73c94c10fc437c637331d67c4b89132b22d9d772488b5a36659208480b731d9e85524f2779ee", &(0x7f0000003300)="71108b207250c076979bfab99c9f57fc9944cae27b658e25556bb5256f93b75ef4ba1b9a5923e40a7293ed9bfcb7d0584092a60b76abd8b20003772f1d54f85cf26dace6ae03923a", 0x2, 0x1, 0x4}, 0x38) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:05 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, 0xffffffffffffffff, 0x19}, 0x10) 19:40:05 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) write$cgroup_int(r0, &(0x7f000002b1c0)=0x6df2, 0x12) openat$cgroup(r5, &(0x7f000002b200)='syz1\x00', 0x200002, 0x0) gettid() 19:40:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r5, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r6, r2, 0x11}, 0x10) write$cgroup_int(r2, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r5}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r2}, 0x78) 19:40:05 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000880)={r6, r3}) r8 = perf_event_open$cgroup(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x20, 0x5, 0x5, 0x0, 0x2, 0x4c18b, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000940), 0x2}, 0x0, 0x0, 0x7, 0x9, 0x9, 0x8000, 0x6}, r3, 0x5, r3, 0x4) perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x64, 0x87, 0x4a, 0x3, 0x0, 0x7fffffff, 0x10, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x6}, 0x0, 0xffff, 0x23, 0x7, 0xcc, 0x8}, 0xffffffffffffffff, 0x7, r8, 0x9) ioctl$TUNSETLINK(r7, 0x400454cd, 0x338) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:40:05 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:05 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r5}, 0x8) ioctl$TUNSETLINK(r6, 0x400454cd, 0x203) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x18, 0x7, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @generic={0x81, 0xe, 0x1, 0x4094, 0xecc}]}, &(0x7f0000000d80)='GPL\x00', 0x200, 0x1000, &(0x7f0000000dc0)=""/4096, 0x41000, 0x12, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000001e00)={0x3, 0x9, 0x3ff, 0x5}, 0x10}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001ec0)={&(0x7f0000000d00)='./file0\x00', r7}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/net/tun\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002080)={0x19, 0xa, &(0x7f0000001f40)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9a}, @generic={0x1f, 0x4, 0x7, 0x0, 0x9}, @generic={0x81, 0x7, 0xf, 0x7c, 0xfff}, @alu={0x4, 0x1, 0x0, 0x1, 0x7, 0x100, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x8f}, @call={0x85, 0x0, 0x0, 0x94}, @generic={0x4, 0xf, 0xb, 0xffff, 0x9}], &(0x7f0000001fc0)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x40f00, 0x4, [], 0x0, 0x19, r0, 0x8, &(0x7f0000002000)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000002040)={0x3, 0xd, 0x6, 0x2800000}, 0x10, 0xffffffffffffffff, r1}, 0x78) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:05 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:05 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) write$cgroup_int(r0, &(0x7f000002b1c0)=0x6df2, 0x12) gettid() 19:40:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup(r3, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r6, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r7, r3, 0x11}, 0x10) write$cgroup_int(r3, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r6}, 0x8) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r2, r10}, 0x78) 19:40:05 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000880)={r6, r3}) r7 = perf_event_open$cgroup(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x20, 0x5, 0x5, 0x0, 0x2, 0x4c18b, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000940), 0x2}, 0x0, 0x0, 0x7, 0x9, 0x9, 0x8000, 0x6}, r3, 0x5, r3, 0x4) perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x64, 0x87, 0x4a, 0x3, 0x0, 0x7fffffff, 0x10, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x6}, 0x0, 0xffff, 0x23, 0x7, 0xcc, 0x8}, 0xffffffffffffffff, 0x7, r7, 0x9) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:40:05 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00'}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, 0xffffffffffffffff, 0x19}, 0x10) 19:40:05 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r5}, 0x8) ioctl$TUNSETLINK(r6, 0x400454cd, 0x203) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x18, 0x7, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @generic={0x81, 0xe, 0x1, 0x4094, 0xecc}]}, &(0x7f0000000d80)='GPL\x00', 0x200, 0x1000, &(0x7f0000000dc0)=""/4096, 0x41000, 0x12, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000001e00)={0x3, 0x9, 0x3ff, 0x5}, 0x10}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001ec0)={&(0x7f0000000d00)='./file0\x00', r7}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/net/tun\x00', 0x100002, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:05 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:05 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) gettid() 19:40:05 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r5}, 0x8) ioctl$TUNSETLINK(r6, 0x400454cd, 0x203) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x18, 0x7, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @generic={0x81, 0xe, 0x1, 0x4094, 0xecc}]}, &(0x7f0000000d80)='GPL\x00', 0x200, 0x1000, &(0x7f0000000dc0)=""/4096, 0x41000, 0x12, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000001e00)={0x3, 0x9, 0x3ff, 0x5}, 0x10}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001ec0)={&(0x7f0000000d00)='./file0\x00', r7}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:05 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, 0xffffffffffffffff, 0x19}, 0x10) 19:40:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup(r3, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r6, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r7, r3, 0x11}, 0x10) write$cgroup_int(r3, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r6}, 0x8) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r2, r10}, 0x78) 19:40:05 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000880)={r6, r3}) perf_event_open$cgroup(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x20, 0x5, 0x5, 0x0, 0x2, 0x4c18b, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000940), 0x2}, 0x0, 0x0, 0x7, 0x9, 0x9, 0x8000, 0x6}, r3, 0x5, r3, 0x4) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:40:05 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:05 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) r5 = bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) openat$cgroup_freezer_state(r5, &(0x7f000002b180)='freezer.state\x00', 0x2, 0x0) gettid() 19:40:05 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r5}, 0x8) ioctl$TUNSETLINK(r6, 0x400454cd, 0x203) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x18, 0x7, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @generic={0x81, 0xe, 0x1, 0x4094, 0xecc}]}, &(0x7f0000000d80)='GPL\x00', 0x200, 0x1000, &(0x7f0000000dc0)=""/4096, 0x41000, 0x12, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000001e00)={0x3, 0x9, 0x3ff, 0x5}, 0x10}, 0x78) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:05 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000880)={r6, r3}) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:40:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup(r3, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r6, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r7, r3, 0x11}, 0x10) write$cgroup_int(r3, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r6}, 0x8) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r2, r10}, 0x78) 19:40:06 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x46, 0xe2, 0x2, 0x8, 0x0, 0x100, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0x200, 0xc7f}, 0x2, 0x1, 0x7, 0x2, 0x3f, 0x4, 0x800}, r0, 0x9, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:06 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, 0xffffffffffffffff, 0x19}, 0x10) 19:40:06 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) bpf$ITER_CREATE(0x21, &(0x7f000002b140), 0x8) gettid() 19:40:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup(r3, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r6, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r7, r3, 0x11}, 0x10) write$cgroup_int(r3, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r6}, 0x8) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, r9, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r2, r10}, 0x78) 19:40:06 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r5}, 0x8) ioctl$TUNSETLINK(r6, 0x400454cd, 0x203) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:06 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:06 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, 0xffffffffffffffff, 0x19}, 0x10) 19:40:06 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:40:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup(r3, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r6, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r7, r3, 0x11}, 0x10) write$cgroup_int(r3, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r6}, 0x8) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, r9, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r2, r10}, 0x78) 19:40:06 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000002b0c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x9, 0xa, 0x9, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x90}], &(0x7f0000000400)='syzkaller\x00', 0x400, 0x36, &(0x7f0000000440)=""/54, 0x41100, 0x1, [], r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f000002b000)={0x6, 0x4}, 0x8, 0x10, &(0x7f000002b040)={0x4, 0xb, 0x9, 0x4}, 0x10, 0x2f6d6, r4}, 0x78) gettid() 19:40:06 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r5}, 0x8) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:06 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup(r3, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r6, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r7, r3, 0x11}, 0x10) write$cgroup_int(r3, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r6}, 0x8) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, r9, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r2, r10}, 0x78) 19:40:06 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map, 0xffffffffffffffff, 0x19}, 0x10) 19:40:06 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000c80)={r4, r5, 0x1e}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:06 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000002b080)={r1}, 0x4) gettid() 19:40:06 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) socketpair(0x0, 0x1, 0x83, &(0x7f0000000800)={0xffffffffffffffff}) recvmsg$kcm(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:40:06 executing program 0: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 19:40:06 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000080)='freezer.state\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup(r3, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r6, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r7, r3, 0x11}, 0x10) write$cgroup_int(r3, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, r9, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r2, r10}, 0x78) 19:40:06 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:06 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002afc0)={&(0x7f000002ae40)=@xdp, 0x80, &(0x7f000002af80)=[{&(0x7f000002aec0)=""/135, 0x87}], 0x1}, 0x2) gettid() 19:40:06 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r3, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)={r0}, 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:40:06 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:06 executing program 0: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 19:40:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup(r3, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r6, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r7, r3, 0x11}, 0x10) write$cgroup_int(r3, &(0x7f0000000540)=0x401, 0x12) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r1}, 0x4) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, r9, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r2, r10}, 0x78) 19:40:06 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, &(0x7f0000000a40)=@raw=[@call={0x85, 0x0, 0x0, 0x46}, @ldst={0x2, 0x1, 0x6, 0x3, 0x2, 0x6}, @exit, @alu={0x7, 0x0, 0x4, 0x3, 0x9, 0x10, 0xffffffffffffffff}], &(0x7f0000000a80)='syzkaller\x00', 0x500, 0x57, &(0x7f0000000ac0)=""/87, 0x40f00, 0x18, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x8, 0x399a, 0x2b}, 0x10}, 0x78) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:06 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:06 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380), 0xc) gettid() 19:40:06 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r0, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000500)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) openat$cgroup(r2, &(0x7f0000000780)='syz0\x00', 0x200002, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:40:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000400)=r5, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280200, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000480)='freezer.state\x00', 0x2, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@map=r6, r2, 0x11}, 0x10) write$cgroup_int(r2, &(0x7f0000000540)=0x401, 0x12) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x4, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x2, 0x0, 0x7}, {0x7, 0x2, 0x101}, {0xe, 0x0, 0x6}]}, @enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x4, 0x3}, {0x10, 0x1}, {0x0, 0x8}, {0xc, 0x4}, {0x0, 0x6c3afc66}, {0xd}]}, @fwd={0x9}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000008c0)=""/207, 0xa0, 0xcf, 0x1}, 0x20) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x7, &(0x7f0000000a80)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @generic={0x80, 0x5, 0x4, 0x8, 0xffffffff}, @jmp={0x5, 0x1, 0x7, 0xe, 0xa, 0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x60}], &(0x7f0000000ac0)='syzkaller\x00', 0x101, 0x8b, &(0x7f0000000b00)=""/139, 0x41100, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x1, 0xa, 0x16c, 0x1}, 0x10, 0xdb8a, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x9, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10000}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000006c0)='GPL\x00', 0xff, 0xe3, &(0x7f0000000700)=""/227, 0x41000, 0x4, [], 0x0, 0x1e, r8, 0x8, &(0x7f0000000a00)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xe, 0x10000, 0xba4}, 0x10, r1, r9}, 0x78) 19:40:06 executing program 0: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 19:40:06 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8cd8}, [@exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x1, 0x0, 0x3, 0x0, 0x2, 0x40, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x1, 0x3, 0x0, 0x10, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffaeac, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}]}, &(0x7f0000000800)='syzkaller\x00', 0x20, 0xd6, &(0x7f0000000840)=""/214, 0x41000, 0x4, [], 0x0, 0x18, r0, 0x8, &(0x7f0000000940)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x9, 0x86, 0x7}, 0x10, 0x2df17, r1}, 0x78) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:06 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x2, 0x6}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x20) gettid() 19:40:06 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xc, 0x8, 0x9}, &(0x7f00000000c0)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x3, 0x8, 0x40, 0x8}, &(0x7f0000000300)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5ade}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r0, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0xa200, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000500)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x6, 0x2, 0x2, 0x0, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x8, 0x62, &(0x7f00000005c0)=""/98, 0x41000, 0x0, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000680)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x10, 0x8, 0x6}, 0x10}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000ac0)=""/134, 0x86}, {&(0x7f0000000b80)=""/141, 0x8d}, {&(0x7f0000000c40)=""/212, 0xd4}, {&(0x7f0000000d40)=""/163, 0xa3}, {&(0x7f0000000e00)=""/217, 0xd9}, {&(0x7f0000000f00)=""/198, 0xc6}], 0x6, &(0x7f0000001080)=""/4096, 0x1000}, 0x2042) 19:40:06 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000003c0)="d47b7bac"}, 0x20) 19:40:06 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map}, 0x10) 19:40:06 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000480)=@raw=[@map={0x18, 0xa, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x2, 0x0, 0x3, 0x6, 0x9aaf9be76ad9e872, 0xffffffffffffffec, 0xffffffffffffffe7}, @map={0x18, 0x4}], &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x42, &(0x7f0000000500)=""/66, 0x41000, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xf, 0x1f, 0x800}, 0x10, 0x118d5}, 0x78) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r2, 0xffffffffffffffff, 0xf, 0x2, r1}, 0x14) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003580)=r2, 0x4) 19:40:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0xa, 0x20}, &(0x7f0000000100)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x100000000}