[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.195' (ECDSA) to the list of known hosts. 2020/12/03 23:17:33 fuzzer started 2020/12/03 23:17:34 dialing manager at 10.128.0.26:45027 2020/12/03 23:17:35 syscalls: 116 2020/12/03 23:17:35 code coverage: enabled 2020/12/03 23:17:35 comparison tracing: enabled 2020/12/03 23:17:35 extra coverage: enabled 2020/12/03 23:17:35 setuid sandbox: enabled 2020/12/03 23:17:35 namespace sandbox: enabled 2020/12/03 23:17:35 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/03 23:17:35 fault injection: enabled 2020/12/03 23:17:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/03 23:17:35 net packet injection: enabled 2020/12/03 23:17:35 net device setup: enabled 2020/12/03 23:17:35 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/12/03 23:17:35 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/03 23:17:35 USB emulation: enabled 2020/12/03 23:17:35 hci packet injection: enabled 2020/12/03 23:17:35 wifi device emulation: enabled 23:17:35 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuacct.stat\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x7, 0xb4, 0xff, 0x20, 0x0, 0xfffffffffffffff8, 0x200, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3d, 0x0, @perf_bp={&(0x7f0000000740), 0xc}, 0x100, 0x1, 0x1ff, 0x9, 0x4, 0x80, 0x5}, 0xffffffffffffffff, 0xd, r5, 0x2) openat$cgroup_devices(r5, &(0x7f0000000840)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)) mkdirat$cgroup(r5, &(0x7f00000008c0)='syz1\x00', 0x1ff) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c80)={&(0x7f0000000900)="81e17a15f7edaf6e8b6f6e4a565465219923ead7c6981117e23d6331156a3e0412a968703ad707de731e849efd8df54f9ef29ef5d16f966ed5b8a9e20359038985d76417c537a7cbf7b4e37d111aeee276c02b3919e58f69257f01f1e1800325b5efeea506ad090d4c728ebb1d86dacd29b38d56e4ba5759a0a25e070204d6086e142882d9d5613f010945c57cc861e49d1674729b3cc5ddd248cefd7bf08c5c326b6b217946a7fc39b69829d47805c429bfbcbeec2ed3d7ea9496058b04aafef96c2a02df7da2e9699dc44c6ded08f7df1cf654910a10382d8653d5", &(0x7f0000000a00)=""/169, &(0x7f0000000ac0)="a16bc41fe573627b9c6428f3c7b2c867c77888ae6de2483b69215ccc5c568fb18064cd7ad4e52838ffc775caa4976197efb1921f8a61c3ae6c0ab6668a942934ed2ddfbd1c4213e7fd8bfd7333103018e48f01a9c8a7f1c71fe267ea223279fe9e26a022b7da2412ed88bd1ec33c6ac9d44da9040aa152e843faffe388ce02ea08981c3346fc21a9522a1e2b5e3fc93f8efd3fdf9bdd65a67fe60372da5393f83f1071de9913f027a6a20e9240de5fdfeb111fbdc73b9b3c58fb8e64", &(0x7f0000000b80)="7f5c1fd99c8e04a2b4a1e2ad5c6d8abb0549052c0ee94cefcdde271917dfb929e8a17f7608e24d139007fb45fcc62f64843f51080c767140056785efbd2d7905a7309d1ff0aee81bad125c36308fffc21e702543e7dc41936fe3f2ce28143f59ef6482c8a3b5b5222d6e67db3642e4387a12b98a960a58ea6000f209997f693b3294a164282ea2ec8360e8108e237f7ab1c07c6c793e924b62fad4baf5975a60860c4b82d64a8c18c70d984cd99b38d558a52584e9cefa39584ce3fbf8fb441ee5decb3a58739511c0339a4f640522f2edc1ce302d4b283a85", 0x7f, r4, 0x4}, 0x38) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000cc0)={r2, r5, 0x8}, 0x10) close(r3) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)={0xa, 0x6, 0xe01, 0x1000, 0x40, r5, 0x63, [], 0x0, r6, 0x4}, 0x40) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r5}, @map_val={0x18, 0xb, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb, r5}, 0x78) 23:17:36 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000600)='GPL\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000007c0)={0x1, &(0x7f0000000640)="0e14078edde6fcf0c20726284b030b71c4aff9f3177821f8af9944e63b499d5e867526b0b739fb28d13414d9e487bd5bc422b096dbc303207374e80b9539b8fdd37848256120a16672f2c97f83468af271ff9c39b34837a70cb1aad7a2ebb2311e46f01b261d5a1e71fbecab39cae427b7ac1b7e440df8f01fc4960ea37fade74e7bc5af3c6da43f50d832a2a58a30be3805264eb35ace6bcb1e", &(0x7f0000000700)=""/144}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000800)={r0, 0x1}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={r4, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c40)={&(0x7f00000008c0)="997709f1ca154c5dbed474eab7b4e41fc8fc94c8b950c4c9871619e96a952e80303551b79f82d0e2d114b32f275d0f6cb9a55426d7f3b808b881fc3a1b6abf56fc04421d4f493ce681eb2c7d0dec1dff2b3c1fad2e1177984eaeba8a8a3d918859e524982c51441d66d0e1f5a4e382683c0913bbce600087b65b38c977914947b830a27e6afff64b30ad695969d61e7dbdace059f23ddabefcd7027cb6a76acb3fdacc82108305b4454ce2e5dc0b63d2d5b07f1c494802a4fdf149cc27ebef1d698dd9b331bcf1c6e6238f9094e4174744b72ca52007b1f82fca692a46db8078006427eaed420d8b49e9bb803d852cc73cf9f682ee3f064f50", &(0x7f00000009c0)=""/164, &(0x7f0000000a80)="bd52c092e14fb923cc2058a2b6ddaf9a9a283cdffc8d51899a238ea2609643dfe24b89059c6ddbdb60bc4928cb6301152dd36b28787d1e433f77174f31db90a3d90a816db7359b70c1e37a5539e845616c5ab3f7c9bf20639f01ba90e113598c3e4585eab8c7f5926db23f730a354c7714a94bff5ef6e50c23268229a38f399829ecfa5e48e8c0789a95cb63c6a65e8e3909bf57cbc96e0b6810dfa75c71e1f8172c56f1c7953bda384572fdb334efa3939c74eea6669741617867fc79c0a00f8446", &(0x7f0000000b80)="b28300ff7876396f2d488d568f5b5759367847e337e6c0c943dd1cbe54f66203480cb9e31776ba845064359fe9fb51d223b7273543f50439c44b7d1ce7019004266deced9ecc693ce032a2010e2af33586daeae105257ff069377e0666468be18c7169705390fa1828af6ad0990e2e38de6aee37781c01e908ad1726aa62d45af8a125ad330b6b78cab4", 0x131, r3}, 0x38) r5 = openat$cgroup_procs(r4, &(0x7f0000000c80)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000cc0)=0xffffffffffffffff, 0x12) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000d40), 0x12) 23:17:36 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00'}) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r0, r1, 0xa}, 0x10) r3 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x70, 0x40, 0x1, 0x81, 0x0, 0xae, 0x28411, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x3ff, 0x5}, 0x440, 0xffff, 0xdea, 0x6, 0x33, 0x0, 0x3}, r3, 0x2, 0xffffffffffffffff, 0x2) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r2}, 0x8) recvmsg$kcm(r4, &(0x7f0000001680)={&(0x7f0000000200)=@isdn, 0x80, &(0x7f0000001500)=[{&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x5, &(0x7f0000001580)=""/217, 0xd9}, 0x40000020) recvmsg$kcm(r4, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000016c0)}, {&(0x7f0000001700)=""/144, 0x90}, {&(0x7f00000017c0)=""/218, 0xda}], 0x3, &(0x7f0000001900)}, 0x10102) r5 = openat$cgroup_ro(r4, &(0x7f0000001980)='freezer.self_freezing\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x2, &(0x7f0000001a00)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r4}], &(0x7f0000001a40)='syzkaller\x00', 0x7fff, 0x32, &(0x7f0000001a80)=""/50, 0x40f00, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0x1, 0x7f, 0xff}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000001bc0)={r7, r8}) recvmsg(r6, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/50, 0x32}, {&(0x7f0000002c40)=""/189, 0xbd}], 0x3, &(0x7f0000002d40)}, 0x40000002) r9 = openat$cgroup_ro(r1, &(0x7f0000002dc0)='devices.list\x00', 0x0, 0x0) r10 = gettid() write$cgroup_pid(r9, &(0x7f0000002e00)=r10, 0x12) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000002e40)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r11, &(0x7f0000002e80)='devices.allow\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002f00)={&(0x7f0000002ec0)='f2fs_get_victim\x00', r8}, 0x10) 23:17:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000940)=""/61) bpf$OBJ_GET_PROG(0x7, &(0x7f00000009c0)={&(0x7f0000000980)='./file0\x00', 0x0, 0x18}, 0x10) 23:17:36 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) r1 = openat$cgroup_ro(r0, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000640)={'vlan0\x00', @remote}) r2 = openat$cgroup_ro(r1, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x40) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xc, 0x5}]}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @const={0xb}, @struct={0x5, 0xa, 0x0, 0x4, 0x0, 0x4, [{0xd, 0x5}, {0x3, 0x1, 0xd7c}, {0xf, 0x4, 0x5}, {0x3, 0x4, 0x40}, {0x6, 0x2, 0x8}, {0x1, 0x4, 0x2}, {0x1, 0x5, 0x3f51f6ee}, {0x7, 0x4, 0x1e}, {0x2, 0x4, 0x54}, {0x8, 0x4}]}]}, {0x0, [0x30, 0x5f]}}, &(0x7f00000007c0)=""/166, 0xcc, 0xa6, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001900)={r3, 0x10, &(0x7f00000018c0)={&(0x7f00000008c0)=""/4096, 0x1000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000019c0)=0x1) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) 23:17:37 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000009f80)={&(0x7f0000008ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f00)=[{&(0x7f0000008b40)=""/215, 0xd7}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/145, 0x91}, {&(0x7f0000009d00)=""/66, 0x42}, {&(0x7f0000009d80)=""/71, 0x47}, {&(0x7f0000009e00)=""/253, 0xfd}], 0x6}, 0x10002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], r6, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) sendmsg(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f000000a0c0)=@ll={0x11, 0x9, r6, 0x1, 0x80, 0x6, @remote}, 0x80, &(0x7f000000a140), 0x0, &(0x7f000000a180)=[{0xe0, 0x10c, 0x1, "e2c47264d7d2a2b408fb8dc461bc632624ca141673fe0eeb41d27bc300c909a396040ef75e6d052761158df288efdf5c6987cac79d2c32e81858fc5ef7c518957531c911a9a99e88b899e7cf80de5340e519a0dbb29b045ab214a22635bf45344b4a9a9b56962dc2133d6e9a991c950e1a67bfe0e03eae026209ce90e068149392e52a30ff81a06f2bad6ceb55bdd446b6d4741c08ebaf7ae1ecde48b7236eb290b4018cd88c84807e94bd2cd96fea6e51c08dd5b8fb50c48e26cd97eb258c164894c5c847b02da9d81d7d0816"}, {0x88, 0x10d, 0x8, "d415b795992660cdaf4b8161b2a27dfe7f218fb5b95e56c179e6cc9f6bdfb5dc5ac0606452805b14896d315fc432865069a9a6eb413dd345ac8bb96b06d89f67ad60178f05729dda770cc7727ba9f9aad4fba4a3e3d45fdf2e85217cc7c1de933aef7743612fff22efb806a58619b302b6"}], 0x168}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f000000a340)='threaded\x00') syzkaller login: [ 65.245979][ T8510] IPVS: ftp: loaded support on port[0] = 21 [ 65.438768][ T8510] chnl_net:caif_netlink_parms(): no params data found [ 65.509431][ T8512] IPVS: ftp: loaded support on port[0] = 21 [ 65.607107][ T8510] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.632689][ T8510] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.681607][ T8510] device bridge_slave_0 entered promiscuous mode [ 65.710326][ T8510] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.717486][ T8510] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.721011][ T8514] IPVS: ftp: loaded support on port[0] = 21 [ 65.734926][ T8510] device bridge_slave_1 entered promiscuous mode [ 65.817593][ T8510] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.838213][ T8510] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.879213][ T8512] chnl_net:caif_netlink_parms(): no params data found [ 65.904509][ T8510] team0: Port device team_slave_0 added [ 65.949829][ T8510] team0: Port device team_slave_1 added [ 65.998668][ T8516] IPVS: ftp: loaded support on port[0] = 21 [ 66.028320][ T8510] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 66.037215][ T8510] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 66.064293][ T8510] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 66.088609][ T8510] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 66.107900][ T8510] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 66.179885][ T8510] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 66.217942][ T8512] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.225923][ T8512] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.235086][ T8512] device bridge_slave_0 entered promiscuous mode [ 66.275864][ T8512] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.283435][ T8512] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.293664][ T8512] device bridge_slave_1 entered promiscuous mode [ 66.315970][ T8518] IPVS: ftp: loaded support on port[0] = 21 [ 66.367206][ T8512] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.434269][ T8510] device hsr_slave_0 entered promiscuous mode [ 66.451930][ T8510] device hsr_slave_1 entered promiscuous mode [ 66.491578][ T8512] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.537464][ T8514] chnl_net:caif_netlink_parms(): no params data found [ 66.567772][ T8512] team0: Port device team_slave_0 added [ 66.596163][ T8531] IPVS: ftp: loaded support on port[0] = 21 [ 66.623055][ T8512] team0: Port device team_slave_1 added [ 66.730908][ T8512] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 66.737887][ T8512] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 66.765193][ T8512] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 66.781294][ T8512] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 66.788257][ T8512] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 66.815422][ T8512] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 66.908495][ T8512] device hsr_slave_0 entered promiscuous mode [ 66.916689][ T8512] device hsr_slave_1 entered promiscuous mode [ 66.923884][ T8512] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 66.933401][ T8512] Cannot create hsr debugfs directory [ 66.979586][ T8514] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.986818][ T8514] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.995754][ T8514] device bridge_slave_0 entered promiscuous mode [ 67.015318][ T8516] chnl_net:caif_netlink_parms(): no params data found [ 67.087826][ T8514] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.097303][ T8514] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.107083][ T8514] device bridge_slave_1 entered promiscuous mode [ 67.172784][ T8514] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.195329][ T8518] chnl_net:caif_netlink_parms(): no params data found [ 67.223063][ T2999] Bluetooth: hci0: command 0x0409 tx timeout [ 67.235762][ T8514] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.308054][ T8514] team0: Port device team_slave_0 added [ 67.363363][ T8514] team0: Port device team_slave_1 added [ 67.443392][ T8516] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.450601][ T23] Bluetooth: hci1: command 0x0409 tx timeout [ 67.462030][ T8516] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.469709][ T8516] device bridge_slave_0 entered promiscuous mode [ 67.488249][ T8514] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.498977][ T8514] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 67.526039][ T8514] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.538154][ T8510] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 67.576332][ T8516] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.584313][ T8516] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.593013][ T8516] device bridge_slave_1 entered promiscuous mode [ 67.604977][ T8514] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.619014][ T8514] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 67.645333][ T8514] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 67.660431][ T8510] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 67.674742][ T8531] chnl_net:caif_netlink_parms(): no params data found [ 67.700077][ T23] Bluetooth: hci2: command 0x0409 tx timeout [ 67.715683][ T8510] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 67.729615][ T8510] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 67.747215][ T8518] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.754758][ T8518] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.763795][ T8518] device bridge_slave_0 entered promiscuous mode [ 67.788555][ T8516] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.815537][ T8518] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.822988][ T8518] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.834334][ T8518] device bridge_slave_1 entered promiscuous mode [ 67.844212][ T8514] device hsr_slave_0 entered promiscuous mode [ 67.856635][ T8514] device hsr_slave_1 entered promiscuous mode [ 67.863787][ T8514] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 67.872027][ T8514] Cannot create hsr debugfs directory [ 67.878947][ T8516] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.930033][ T3077] Bluetooth: hci3: command 0x0409 tx timeout [ 67.988047][ T8518] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.004200][ T8518] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.055160][ T8516] team0: Port device team_slave_0 added [ 68.071148][ T8531] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.078275][ T8531] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.087900][ T8531] device bridge_slave_0 entered promiscuous mode [ 68.112589][ T8516] team0: Port device team_slave_1 added [ 68.135875][ T8531] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.143665][ T8531] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.152150][ T8531] device bridge_slave_1 entered promiscuous mode [ 68.170324][ T9447] Bluetooth: hci4: command 0x0409 tx timeout [ 68.187994][ T8518] team0: Port device team_slave_0 added [ 68.208508][ T8512] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 68.228253][ T8516] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.238575][ T8516] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.264983][ T8516] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.279141][ T8518] team0: Port device team_slave_1 added [ 68.298960][ T8531] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.312103][ T8512] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 68.325018][ T8516] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.333031][ T8516] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.361481][ T8516] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.382313][ T8531] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.420123][ T8512] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 68.445452][ T8531] team0: Port device team_slave_0 added [ 68.466155][ T8512] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 68.477692][ T8518] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.487396][ T8518] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.514291][ T23] Bluetooth: hci5: command 0x0409 tx timeout [ 68.521605][ T8518] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.536061][ T8518] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.543610][ T8518] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.570275][ T8518] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.583886][ T8531] team0: Port device team_slave_1 added [ 68.608570][ T8516] device hsr_slave_0 entered promiscuous mode [ 68.615487][ T8516] device hsr_slave_1 entered promiscuous mode [ 68.623738][ T8516] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 68.633004][ T8516] Cannot create hsr debugfs directory [ 68.744494][ T8531] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.752147][ T8531] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.789316][ T8531] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.803801][ T8531] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.811717][ T8531] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.838227][ T8531] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.862432][ T8518] device hsr_slave_0 entered promiscuous mode [ 68.875719][ T8518] device hsr_slave_1 entered promiscuous mode [ 68.882994][ T8518] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 68.890974][ T8518] Cannot create hsr debugfs directory [ 68.994718][ T8531] device hsr_slave_0 entered promiscuous mode [ 69.002579][ T8531] device hsr_slave_1 entered promiscuous mode [ 69.012555][ T8531] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 69.020623][ T8531] Cannot create hsr debugfs directory [ 69.030615][ T8514] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 69.039632][ T8514] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 69.059045][ T8510] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.085973][ T8514] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 69.129642][ T8514] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 69.162296][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.172152][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.204328][ T8510] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.289958][ T23] Bluetooth: hci0: command 0x041b tx timeout [ 69.326653][ T8512] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.373766][ T8516] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 69.391392][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.411479][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.441263][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.448546][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.487799][ T8516] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 69.515131][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.529868][ T3190] Bluetooth: hci1: command 0x041b tx timeout [ 69.532521][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.568704][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.598182][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.605367][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.631717][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.640999][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.661206][ T8512] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.702627][ T8516] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 69.717841][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.726296][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.735462][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.745166][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.754117][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 69.763315][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.772613][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.781547][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.793662][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.817431][ T8510] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 69.818278][ T8510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 69.835167][ T8516] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 69.857975][ T3190] Bluetooth: hci2: command 0x041b tx timeout [ 69.865764][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.875528][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.885138][ T3190] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.892267][ T3190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.900450][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.908933][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.917431][ T3190] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.924579][ T3190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.932713][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 69.941278][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.985562][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.997369][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.008304][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.017638][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.019914][ T9447] Bluetooth: hci3: command 0x041b tx timeout [ 70.027384][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.045888][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.055084][ T8518] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 70.079469][ T8518] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 70.103877][ T8514] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.126839][ T8518] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 70.138071][ T8518] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 70.168934][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.177938][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.203206][ T8514] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.239288][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.248145][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.256937][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 70.265034][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 70.274499][ T9447] Bluetooth: hci4: command 0x041b tx timeout [ 70.283005][ T8531] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 70.297407][ T8531] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 70.334100][ T8510] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.347248][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.356253][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.370793][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.379311][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.388381][ T9447] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.395533][ T9447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.403115][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.411904][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.420427][ T9447] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.427480][ T9447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.436018][ T8531] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 70.466486][ T8512] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 70.483811][ T8512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.495977][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.505097][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.514654][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.523806][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.533468][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.542448][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.552522][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.561744][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.571375][ T23] Bluetooth: hci5: command 0x041b tx timeout [ 70.581002][ T8531] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 70.617347][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.628256][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.679989][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 70.690986][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 70.699497][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.709272][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.748748][ T8518] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.766498][ T8514] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 70.777866][ T8514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.792359][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 70.805541][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 70.813240][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 70.822724][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.831744][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.840816][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.852870][ T8512] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.878603][ T8510] device veth0_vlan entered promiscuous mode [ 70.886456][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.896267][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 70.928518][ T8516] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.950856][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.958702][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.983580][ T8518] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.997561][ T8510] device veth1_vlan entered promiscuous mode [ 71.016317][ T8514] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.027283][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.035790][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.043966][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.055460][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.077365][ T8516] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.099749][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.108343][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.123569][ T3077] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.130751][ T3077] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.139776][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.150590][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.158927][ T3077] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.166053][ T3077] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.177012][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.185193][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 71.194694][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.267726][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.277409][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.286896][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.298456][ T9797] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.305591][ T9797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.313967][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.322979][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.332247][ T9797] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.339319][ T9797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.347828][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.356957][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.366116][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.375337][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.380262][ T9447] Bluetooth: hci0: command 0x040f tx timeout [ 71.384388][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 71.398090][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.407275][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.416160][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.425117][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.433965][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.450826][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.468301][ T8512] device veth0_vlan entered promiscuous mode [ 71.513132][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.530995][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.538983][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.561174][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 71.569280][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.582492][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.591045][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.599221][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.608432][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.626579][ T8531] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.634653][ T3190] Bluetooth: hci1: command 0x040f tx timeout [ 71.654273][ T8518] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 71.666799][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.677395][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.686187][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.695844][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.704906][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.713892][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.722749][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.731398][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 71.740023][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 71.758303][ T8514] device veth0_vlan entered promiscuous mode [ 71.774826][ T8516] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 71.797810][ T8516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.814196][ T8510] device veth0_macvtap entered promiscuous mode [ 71.825828][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 71.834459][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 71.842890][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.852361][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.860882][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.875813][ T8514] device veth1_vlan entered promiscuous mode [ 71.907487][ T8512] device veth1_vlan entered promiscuous mode [ 71.919216][ T8510] device veth1_macvtap entered promiscuous mode [ 71.929816][ T3077] Bluetooth: hci2: command 0x040f tx timeout [ 71.936245][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.949725][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.957278][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.966080][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.993744][ T8518] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.017477][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.030630][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 72.038228][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 72.050815][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 72.075559][ T8531] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.090148][ T7] Bluetooth: hci3: command 0x040f tx timeout [ 72.105788][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.121860][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.131894][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.142202][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.151618][ T9447] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.158670][ T9447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.169244][ T8514] device veth0_macvtap entered promiscuous mode [ 72.207455][ T8516] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.222762][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 72.233487][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.250453][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 72.259020][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.268245][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.275356][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.284098][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.293082][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.302579][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.314292][ T8514] device veth1_macvtap entered promiscuous mode [ 72.332523][ T8512] device veth0_macvtap entered promiscuous mode [ 72.340164][ T9447] Bluetooth: hci4: command 0x040f tx timeout [ 72.352096][ T8510] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.370221][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 72.378216][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 72.389386][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.398922][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.417632][ T8512] device veth1_macvtap entered promiscuous mode [ 72.434324][ T8510] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 72.472921][ T8514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 72.483985][ T8514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.496047][ T8514] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.509785][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 72.518651][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.527699][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.539305][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.548220][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.557265][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.566999][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.576928][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.585937][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 72.595739][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 72.604484][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.613556][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.622380][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.631196][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.643056][ T8510] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.656059][ T8510] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.656196][ T23] Bluetooth: hci5: command 0x040f tx timeout [ 72.676164][ T8510] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.687642][ T8510] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.735213][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 72.745620][ T8512] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 72.762146][ T8512] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.772215][ T8512] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 72.782750][ T8512] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.794000][ T8512] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.823287][ T8514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 72.835864][ T8514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.847591][ T8514] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 72.862737][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.874886][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.884449][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.893589][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.903174][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 72.911986][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.921206][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.929459][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.938103][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.947349][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.961530][ T8518] device veth0_vlan entered promiscuous mode [ 72.969398][ T8531] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 72.985934][ T8531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.996706][ T8516] device veth0_vlan entered promiscuous mode [ 73.029138][ T8514] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.038349][ T8514] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.056524][ T8514] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.067358][ T8514] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.081542][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.095722][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.104210][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.116674][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.125593][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 73.138652][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.156609][ T8518] device veth1_vlan entered promiscuous mode [ 73.168405][ T8512] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 73.180945][ T8512] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.191721][ T8512] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 73.204615][ T8512] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.218206][ T8512] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.280941][ T8516] device veth1_vlan entered promiscuous mode [ 73.295805][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 73.306851][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 73.319055][ T8512] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.331723][ T8512] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.340941][ T8512] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.349742][ T8512] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.451333][ T9462] Bluetooth: hci0: command 0x0419 tx timeout [ 73.465020][ T8518] device veth0_macvtap entered promiscuous mode [ 73.483005][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 73.498602][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 73.519386][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.539925][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.565035][ T8531] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.622667][ T8518] device veth1_macvtap entered promiscuous mode [ 73.638092][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 73.655364][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 73.676503][ T8516] device veth0_macvtap entered promiscuous mode [ 73.690852][ T23] Bluetooth: hci1: command 0x0419 tx timeout [ 73.696224][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.713858][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.736065][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.745743][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.760396][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 73.798986][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 73.813354][ T8518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 73.826506][ T8518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.839799][ T8518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 73.867360][ T8518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.877699][ T8518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 73.888365][ T8518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.900478][ T8518] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.916056][ T8516] device veth1_macvtap entered promiscuous mode [ 73.945451][ T9841] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 73.957981][ T9841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 73.966860][ T9841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.983218][ T8518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 73.994273][ T8518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.004889][ T8518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.016096][ T17] Bluetooth: hci2: command 0x0419 tx timeout [ 74.022321][ T8518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.034452][ T8518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.045674][ T8518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.057362][ T8518] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.103159][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.110493][ T880] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.112072][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 74.119136][ T880] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.142466][ T8518] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.161280][ T8518] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.174051][ T9462] Bluetooth: hci3: command 0x0419 tx timeout [ 74.181280][ T8518] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.194148][ T8518] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.214565][ T8516] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.225570][ T8516] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.236488][ T8516] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.247527][ T8516] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.258037][ T8516] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.270561][ T8516] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.282020][ T8516] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 74.292816][ T8516] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.304140][ T8516] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.312693][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 74.321528][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 74.332205][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 74.351148][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.377675][ T8516] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.393200][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.406528][ T8516] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.417371][ T17] Bluetooth: hci4: command 0x0419 tx timeout [ 74.428069][ T8516] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.438674][ T8516] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.448577][ T8516] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.459083][ T8516] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.469166][ T8516] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 74.480739][ T8516] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.493345][ T8516] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.534972][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 74.552261][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.569212][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 74.579072][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 74.588558][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 74.650241][ T37] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.658637][ T37] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.687309][ T8516] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 23:17:46 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuacct.stat\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x7, 0xb4, 0xff, 0x20, 0x0, 0xfffffffffffffff8, 0x200, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3d, 0x0, @perf_bp={&(0x7f0000000740), 0xc}, 0x100, 0x1, 0x1ff, 0x9, 0x4, 0x80, 0x5}, 0xffffffffffffffff, 0xd, r5, 0x2) openat$cgroup_devices(r5, &(0x7f0000000840)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)) mkdirat$cgroup(r5, &(0x7f00000008c0)='syz1\x00', 0x1ff) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c80)={&(0x7f0000000900)="81e17a15f7edaf6e8b6f6e4a565465219923ead7c6981117e23d6331156a3e0412a968703ad707de731e849efd8df54f9ef29ef5d16f966ed5b8a9e20359038985d76417c537a7cbf7b4e37d111aeee276c02b3919e58f69257f01f1e1800325b5efeea506ad090d4c728ebb1d86dacd29b38d56e4ba5759a0a25e070204d6086e142882d9d5613f010945c57cc861e49d1674729b3cc5ddd248cefd7bf08c5c326b6b217946a7fc39b69829d47805c429bfbcbeec2ed3d7ea9496058b04aafef96c2a02df7da2e9699dc44c6ded08f7df1cf654910a10382d8653d5", &(0x7f0000000a00)=""/169, &(0x7f0000000ac0)="a16bc41fe573627b9c6428f3c7b2c867c77888ae6de2483b69215ccc5c568fb18064cd7ad4e52838ffc775caa4976197efb1921f8a61c3ae6c0ab6668a942934ed2ddfbd1c4213e7fd8bfd7333103018e48f01a9c8a7f1c71fe267ea223279fe9e26a022b7da2412ed88bd1ec33c6ac9d44da9040aa152e843faffe388ce02ea08981c3346fc21a9522a1e2b5e3fc93f8efd3fdf9bdd65a67fe60372da5393f83f1071de9913f027a6a20e9240de5fdfeb111fbdc73b9b3c58fb8e64", &(0x7f0000000b80)="7f5c1fd99c8e04a2b4a1e2ad5c6d8abb0549052c0ee94cefcdde271917dfb929e8a17f7608e24d139007fb45fcc62f64843f51080c767140056785efbd2d7905a7309d1ff0aee81bad125c36308fffc21e702543e7dc41936fe3f2ce28143f59ef6482c8a3b5b5222d6e67db3642e4387a12b98a960a58ea6000f209997f693b3294a164282ea2ec8360e8108e237f7ab1c07c6c793e924b62fad4baf5975a60860c4b82d64a8c18c70d984cd99b38d558a52584e9cefa39584ce3fbf8fb441ee5decb3a58739511c0339a4f640522f2edc1ce302d4b283a85", 0x7f, r4, 0x4}, 0x38) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000cc0)={r2, r5, 0x8}, 0x10) close(r3) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)={0xa, 0x6, 0xe01, 0x1000, 0x40, r5, 0x63, [], 0x0, r6, 0x4}, 0x40) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r5}, @map_val={0x18, 0xb, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb, r5}, 0x78) [ 74.696439][ T8516] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.714090][ T8516] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.730283][ T9462] Bluetooth: hci5: command 0x0419 tx timeout [ 74.769974][ T8516] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.816595][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 23:17:46 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuacct.stat\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x7, 0xb4, 0xff, 0x20, 0x0, 0xfffffffffffffff8, 0x200, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3d, 0x0, @perf_bp={&(0x7f0000000740), 0xc}, 0x100, 0x1, 0x1ff, 0x9, 0x4, 0x80, 0x5}, 0xffffffffffffffff, 0xd, r5, 0x2) openat$cgroup_devices(r5, &(0x7f0000000840)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)) mkdirat$cgroup(r5, &(0x7f00000008c0)='syz1\x00', 0x1ff) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c80)={&(0x7f0000000900)="81e17a15f7edaf6e8b6f6e4a565465219923ead7c6981117e23d6331156a3e0412a968703ad707de731e849efd8df54f9ef29ef5d16f966ed5b8a9e20359038985d76417c537a7cbf7b4e37d111aeee276c02b3919e58f69257f01f1e1800325b5efeea506ad090d4c728ebb1d86dacd29b38d56e4ba5759a0a25e070204d6086e142882d9d5613f010945c57cc861e49d1674729b3cc5ddd248cefd7bf08c5c326b6b217946a7fc39b69829d47805c429bfbcbeec2ed3d7ea9496058b04aafef96c2a02df7da2e9699dc44c6ded08f7df1cf654910a10382d8653d5", &(0x7f0000000a00)=""/169, &(0x7f0000000ac0)="a16bc41fe573627b9c6428f3c7b2c867c77888ae6de2483b69215ccc5c568fb18064cd7ad4e52838ffc775caa4976197efb1921f8a61c3ae6c0ab6668a942934ed2ddfbd1c4213e7fd8bfd7333103018e48f01a9c8a7f1c71fe267ea223279fe9e26a022b7da2412ed88bd1ec33c6ac9d44da9040aa152e843faffe388ce02ea08981c3346fc21a9522a1e2b5e3fc93f8efd3fdf9bdd65a67fe60372da5393f83f1071de9913f027a6a20e9240de5fdfeb111fbdc73b9b3c58fb8e64", &(0x7f0000000b80)="7f5c1fd99c8e04a2b4a1e2ad5c6d8abb0549052c0ee94cefcdde271917dfb929e8a17f7608e24d139007fb45fcc62f64843f51080c767140056785efbd2d7905a7309d1ff0aee81bad125c36308fffc21e702543e7dc41936fe3f2ce28143f59ef6482c8a3b5b5222d6e67db3642e4387a12b98a960a58ea6000f209997f693b3294a164282ea2ec8360e8108e237f7ab1c07c6c793e924b62fad4baf5975a60860c4b82d64a8c18c70d984cd99b38d558a52584e9cefa39584ce3fbf8fb441ee5decb3a58739511c0339a4f640522f2edc1ce302d4b283a85", 0x7f, r4, 0x4}, 0x38) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000cc0)={r2, r5, 0x8}, 0x10) close(r3) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)={0xa, 0x6, 0xe01, 0x1000, 0x40, r5, 0x63, [], 0x0, r6, 0x4}, 0x40) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r5}, @map_val={0x18, 0xb, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb, r5}, 0x78) [ 74.858780][ T8531] device veth0_vlan entered promiscuous mode [ 74.940120][ T37] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.959586][ T880] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.962179][ T432] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.967610][ T880] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.973864][ T37] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 23:17:47 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuacct.stat\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x7, 0xb4, 0xff, 0x20, 0x0, 0xfffffffffffffff8, 0x200, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3d, 0x0, @perf_bp={&(0x7f0000000740), 0xc}, 0x100, 0x1, 0x1ff, 0x9, 0x4, 0x80, 0x5}, 0xffffffffffffffff, 0xd, r5, 0x2) openat$cgroup_devices(r5, &(0x7f0000000840)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)) mkdirat$cgroup(r5, &(0x7f00000008c0)='syz1\x00', 0x1ff) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c80)={&(0x7f0000000900)="81e17a15f7edaf6e8b6f6e4a565465219923ead7c6981117e23d6331156a3e0412a968703ad707de731e849efd8df54f9ef29ef5d16f966ed5b8a9e20359038985d76417c537a7cbf7b4e37d111aeee276c02b3919e58f69257f01f1e1800325b5efeea506ad090d4c728ebb1d86dacd29b38d56e4ba5759a0a25e070204d6086e142882d9d5613f010945c57cc861e49d1674729b3cc5ddd248cefd7bf08c5c326b6b217946a7fc39b69829d47805c429bfbcbeec2ed3d7ea9496058b04aafef96c2a02df7da2e9699dc44c6ded08f7df1cf654910a10382d8653d5", &(0x7f0000000a00)=""/169, &(0x7f0000000ac0)="a16bc41fe573627b9c6428f3c7b2c867c77888ae6de2483b69215ccc5c568fb18064cd7ad4e52838ffc775caa4976197efb1921f8a61c3ae6c0ab6668a942934ed2ddfbd1c4213e7fd8bfd7333103018e48f01a9c8a7f1c71fe267ea223279fe9e26a022b7da2412ed88bd1ec33c6ac9d44da9040aa152e843faffe388ce02ea08981c3346fc21a9522a1e2b5e3fc93f8efd3fdf9bdd65a67fe60372da5393f83f1071de9913f027a6a20e9240de5fdfeb111fbdc73b9b3c58fb8e64", &(0x7f0000000b80)="7f5c1fd99c8e04a2b4a1e2ad5c6d8abb0549052c0ee94cefcdde271917dfb929e8a17f7608e24d139007fb45fcc62f64843f51080c767140056785efbd2d7905a7309d1ff0aee81bad125c36308fffc21e702543e7dc41936fe3f2ce28143f59ef6482c8a3b5b5222d6e67db3642e4387a12b98a960a58ea6000f209997f693b3294a164282ea2ec8360e8108e237f7ab1c07c6c793e924b62fad4baf5975a60860c4b82d64a8c18c70d984cd99b38d558a52584e9cefa39584ce3fbf8fb441ee5decb3a58739511c0339a4f640522f2edc1ce302d4b283a85", 0x7f, r4, 0x4}, 0x38) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000cc0)={r2, r5, 0x8}, 0x10) close(r3) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)={0xa, 0x6, 0xe01, 0x1000, 0x40, r5, 0x63, [], 0x0, r6, 0x4}, 0x40) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r5}, @map_val={0x18, 0xb, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb, r5}, 0x78) [ 75.010348][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 75.018840][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.028572][ T432] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.048462][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 75.100958][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.109231][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 23:17:47 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x7, 0xb4, 0xff, 0x20, 0x0, 0xfffffffffffffff8, 0x200, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3d, 0x0, @perf_bp={&(0x7f0000000740), 0xc}, 0x100, 0x1, 0x1ff, 0x9, 0x4, 0x80, 0x5}, 0xffffffffffffffff, 0xd, r5, 0x2) openat$cgroup_devices(r5, &(0x7f0000000840)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)) mkdirat$cgroup(r5, &(0x7f00000008c0)='syz1\x00', 0x1ff) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c80)={&(0x7f0000000900)="81e17a15f7edaf6e8b6f6e4a565465219923ead7c6981117e23d6331156a3e0412a968703ad707de731e849efd8df54f9ef29ef5d16f966ed5b8a9e20359038985d76417c537a7cbf7b4e37d111aeee276c02b3919e58f69257f01f1e1800325b5efeea506ad090d4c728ebb1d86dacd29b38d56e4ba5759a0a25e070204d6086e142882d9d5613f010945c57cc861e49d1674729b3cc5ddd248cefd7bf08c5c326b6b217946a7fc39b69829d47805c429bfbcbeec2ed3d7ea9496058b04aafef96c2a02df7da2e9699dc44c6ded08f7df1cf654910a10382d8653d5", &(0x7f0000000a00)=""/169, &(0x7f0000000ac0)="a16bc41fe573627b9c6428f3c7b2c867c77888ae6de2483b69215ccc5c568fb18064cd7ad4e52838ffc775caa4976197efb1921f8a61c3ae6c0ab6668a942934ed2ddfbd1c4213e7fd8bfd7333103018e48f01a9c8a7f1c71fe267ea223279fe9e26a022b7da2412ed88bd1ec33c6ac9d44da9040aa152e843faffe388ce02ea08981c3346fc21a9522a1e2b5e3fc93f8efd3fdf9bdd65a67fe60372da5393f83f1071de9913f027a6a20e9240de5fdfeb111fbdc73b9b3c58fb8e64", &(0x7f0000000b80)="7f5c1fd99c8e04a2b4a1e2ad5c6d8abb0549052c0ee94cefcdde271917dfb929e8a17f7608e24d139007fb45fcc62f64843f51080c767140056785efbd2d7905a7309d1ff0aee81bad125c36308fffc21e702543e7dc41936fe3f2ce28143f59ef6482c8a3b5b5222d6e67db3642e4387a12b98a960a58ea6000f209997f693b3294a164282ea2ec8360e8108e237f7ab1c07c6c793e924b62fad4baf5975a60860c4b82d64a8c18c70d984cd99b38d558a52584e9cefa39584ce3fbf8fb441ee5decb3a58739511c0339a4f640522f2edc1ce302d4b283a85", 0x7f, r4, 0x4}, 0x38) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000cc0)={r2, r5, 0x8}, 0x10) close(r3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r5}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb, r5}, 0x78) [ 75.150726][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 75.158544][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 75.244801][ T8531] device veth1_vlan entered promiscuous mode [ 75.290229][ T9910] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.298231][ T9910] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 23:17:47 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x7, 0xb4, 0xff, 0x20, 0x0, 0xfffffffffffffff8, 0x200, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3d, 0x0, @perf_bp={&(0x7f0000000740), 0xc}, 0x100, 0x1, 0x1ff, 0x9, 0x4, 0x80, 0x5}, 0xffffffffffffffff, 0xd, r5, 0x2) openat$cgroup_devices(r5, &(0x7f0000000840)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)) mkdirat$cgroup(r5, &(0x7f00000008c0)='syz1\x00', 0x1ff) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c80)={&(0x7f0000000900)="81e17a15f7edaf6e8b6f6e4a565465219923ead7c6981117e23d6331156a3e0412a968703ad707de731e849efd8df54f9ef29ef5d16f966ed5b8a9e20359038985d76417c537a7cbf7b4e37d111aeee276c02b3919e58f69257f01f1e1800325b5efeea506ad090d4c728ebb1d86dacd29b38d56e4ba5759a0a25e070204d6086e142882d9d5613f010945c57cc861e49d1674729b3cc5ddd248cefd7bf08c5c326b6b217946a7fc39b69829d47805c429bfbcbeec2ed3d7ea9496058b04aafef96c2a02df7da2e9699dc44c6ded08f7df1cf654910a10382d8653d5", &(0x7f0000000a00)=""/169, &(0x7f0000000ac0)="a16bc41fe573627b9c6428f3c7b2c867c77888ae6de2483b69215ccc5c568fb18064cd7ad4e52838ffc775caa4976197efb1921f8a61c3ae6c0ab6668a942934ed2ddfbd1c4213e7fd8bfd7333103018e48f01a9c8a7f1c71fe267ea223279fe9e26a022b7da2412ed88bd1ec33c6ac9d44da9040aa152e843faffe388ce02ea08981c3346fc21a9522a1e2b5e3fc93f8efd3fdf9bdd65a67fe60372da5393f83f1071de9913f027a6a20e9240de5fdfeb111fbdc73b9b3c58fb8e64", &(0x7f0000000b80)="7f5c1fd99c8e04a2b4a1e2ad5c6d8abb0549052c0ee94cefcdde271917dfb929e8a17f7608e24d139007fb45fcc62f64843f51080c767140056785efbd2d7905a7309d1ff0aee81bad125c36308fffc21e702543e7dc41936fe3f2ce28143f59ef6482c8a3b5b5222d6e67db3642e4387a12b98a960a58ea6000f209997f693b3294a164282ea2ec8360e8108e237f7ab1c07c6c793e924b62fad4baf5975a60860c4b82d64a8c18c70d984cd99b38d558a52584e9cefa39584ce3fbf8fb441ee5decb3a58739511c0339a4f640522f2edc1ce302d4b283a85", 0x7f, r4, 0x4}, 0x38) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000cc0)={r2, r5, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r5}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb, r5}, 0x78) [ 75.347994][ T9841] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 23:17:47 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000600)='GPL\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000007c0)={0x1, &(0x7f0000000640)="0e14078edde6fcf0c20726284b030b71c4aff9f3177821f8af9944e63b499d5e867526b0b739fb28d13414d9e487bd5bc422b096dbc303207374e80b9539b8fdd37848256120a16672f2c97f83468af271ff9c39b34837a70cb1aad7a2ebb2311e46f01b261d5a1e71fbecab39cae427b7ac1b7e440df8f01fc4960ea37fade74e7bc5af3c6da43f50d832a2a58a30be3805264eb35ace6bcb1e", &(0x7f0000000700)=""/144}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000800)={r0, 0x1}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={r4, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c40)={&(0x7f00000008c0)="997709f1ca154c5dbed474eab7b4e41fc8fc94c8b950c4c9871619e96a952e80303551b79f82d0e2d114b32f275d0f6cb9a55426d7f3b808b881fc3a1b6abf56fc04421d4f493ce681eb2c7d0dec1dff2b3c1fad2e1177984eaeba8a8a3d918859e524982c51441d66d0e1f5a4e382683c0913bbce600087b65b38c977914947b830a27e6afff64b30ad695969d61e7dbdace059f23ddabefcd7027cb6a76acb3fdacc82108305b4454ce2e5dc0b63d2d5b07f1c494802a4fdf149cc27ebef1d698dd9b331bcf1c6e6238f9094e4174744b72ca52007b1f82fca692a46db8078006427eaed420d8b49e9bb803d852cc73cf9f682ee3f064f50", &(0x7f00000009c0)=""/164, &(0x7f0000000a80)="bd52c092e14fb923cc2058a2b6ddaf9a9a283cdffc8d51899a238ea2609643dfe24b89059c6ddbdb60bc4928cb6301152dd36b28787d1e433f77174f31db90a3d90a816db7359b70c1e37a5539e845616c5ab3f7c9bf20639f01ba90e113598c3e4585eab8c7f5926db23f730a354c7714a94bff5ef6e50c23268229a38f399829ecfa5e48e8c0789a95cb63c6a65e8e3909bf57cbc96e0b6810dfa75c71e1f8172c56f1c7953bda384572fdb334efa3939c74eea6669741617867fc79c0a00f8446", &(0x7f0000000b80)="b28300ff7876396f2d488d568f5b5759367847e337e6c0c943dd1cbe54f66203480cb9e31776ba845064359fe9fb51d223b7273543f50439c44b7d1ce7019004266deced9ecc693ce032a2010e2af33586daeae105257ff069377e0666468be18c7169705390fa1828af6ad0990e2e38de6aee37781c01e908ad1726aa62d45af8a125ad330b6b78cab4", 0x131, r3}, 0x38) r5 = openat$cgroup_procs(r4, &(0x7f0000000c80)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000cc0)=0xffffffffffffffff, 0x12) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000d40), 0x12) [ 75.467607][ T37] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.481285][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 75.495157][ T37] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.506964][ T9797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 75.554737][ T8531] device veth0_macvtap entered promiscuous mode [ 75.588506][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 23:17:47 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x7, 0xb4, 0xff, 0x20, 0x0, 0xfffffffffffffff8, 0x200, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3d, 0x0, @perf_bp={&(0x7f0000000740), 0xc}, 0x100, 0x1, 0x1ff, 0x9, 0x4, 0x80, 0x5}, 0xffffffffffffffff, 0xd, r5, 0x2) openat$cgroup_devices(r5, &(0x7f0000000840)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)) mkdirat$cgroup(r5, &(0x7f00000008c0)='syz1\x00', 0x1ff) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c80)={&(0x7f0000000900)="81e17a15f7edaf6e8b6f6e4a565465219923ead7c6981117e23d6331156a3e0412a968703ad707de731e849efd8df54f9ef29ef5d16f966ed5b8a9e20359038985d76417c537a7cbf7b4e37d111aeee276c02b3919e58f69257f01f1e1800325b5efeea506ad090d4c728ebb1d86dacd29b38d56e4ba5759a0a25e070204d6086e142882d9d5613f010945c57cc861e49d1674729b3cc5ddd248cefd7bf08c5c326b6b217946a7fc39b69829d47805c429bfbcbeec2ed3d7ea9496058b04aafef96c2a02df7da2e9699dc44c6ded08f7df1cf654910a10382d8653d5", &(0x7f0000000a00)=""/169, &(0x7f0000000ac0)="a16bc41fe573627b9c6428f3c7b2c867c77888ae6de2483b69215ccc5c568fb18064cd7ad4e52838ffc775caa4976197efb1921f8a61c3ae6c0ab6668a942934ed2ddfbd1c4213e7fd8bfd7333103018e48f01a9c8a7f1c71fe267ea223279fe9e26a022b7da2412ed88bd1ec33c6ac9d44da9040aa152e843faffe388ce02ea08981c3346fc21a9522a1e2b5e3fc93f8efd3fdf9bdd65a67fe60372da5393f83f1071de9913f027a6a20e9240de5fdfeb111fbdc73b9b3c58fb8e64", &(0x7f0000000b80)="7f5c1fd99c8e04a2b4a1e2ad5c6d8abb0549052c0ee94cefcdde271917dfb929e8a17f7608e24d139007fb45fcc62f64843f51080c767140056785efbd2d7905a7309d1ff0aee81bad125c36308fffc21e702543e7dc41936fe3f2ce28143f59ef6482c8a3b5b5222d6e67db3642e4387a12b98a960a58ea6000f209997f693b3294a164282ea2ec8360e8108e237f7ab1c07c6c793e924b62fad4baf5975a60860c4b82d64a8c18c70d984cd99b38d558a52584e9cefa39584ce3fbf8fb441ee5decb3a58739511c0339a4f640522f2edc1ce302d4b283a85", 0x7f, r4, 0x4}, 0x38) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r5}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb, r5}, 0x78) [ 75.601288][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 23:17:47 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="6018e6847e4e8ef9b6b6c34ef659469d960b24f5d6d47de3d57730da155666409a4c0b26055abe4bf34be86d27d4b97b1b74b611c1bf499b62751c461cefedf2b37239a90eca28c9e6479c53ad05ecc0250a9b83532f3c6225dd0e99316f4a1e0b65e54f7058751c7bf870c558ea61cf8336c99c4ee5e3f83580a06e001f91a6df6151fdc35ef478125e76135fcf434f2800ab99c9c778094a3f4ecdb98f4d115976383a7637de9c80f426427526ba8dee2ae15f6b43b8712011ecf86378274d93ac3402d2f16dc69bfaf7c815181292bb59ae6a0a4f8631a7877ccffb749c342fb646911a0350258f25dc6972948dc63f776ecbbf90d1464103cc4369", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) r1 = openat$cgroup_ro(r0, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000640)={'vlan0\x00', @remote}) r2 = openat$cgroup_ro(r1, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x40) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xc, 0x5}]}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @const={0xb}, @struct={0x5, 0xa, 0x0, 0x4, 0x0, 0x4, [{0xd, 0x5}, {0x3, 0x1, 0xd7c}, {0xf, 0x4, 0x5}, {0x3, 0x4, 0x40}, {0x6, 0x2, 0x8}, {0x1, 0x4, 0x2}, {0x1, 0x5, 0x3f51f6ee}, {0x7, 0x4, 0x1e}, {0x2, 0x4, 0x54}, {0x8, 0x4}]}]}, {0x0, [0x30, 0x5f]}}, &(0x7f00000007c0)=""/166, 0xcc, 0xa6, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001900)={r3, 0x10, &(0x7f00000018c0)={&(0x7f00000008c0)=""/4096, 0x1000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000019c0)=0x1) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) [ 75.658946][ T37] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.660413][ T8531] device veth1_macvtap entered promiscuous mode [ 75.683891][ T37] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.751225][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 75.776915][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 75.828184][ T8531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.849013][ T8531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.861463][ T8531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.873916][ T8531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.884781][ T8531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.902511][ T8531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.913600][ T8531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.925389][ T8531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.958986][ T8531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 75.994988][ T8531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.015601][ T8531] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 76.028482][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 76.040592][ T9462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.053410][ T8531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 76.065843][ T8531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.078452][ T8531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 76.090793][ T8531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.101888][ T8531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 76.113545][ T8531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.125279][ T8531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 76.136626][ T8531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.157051][ T8531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 76.170138][ T8531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:17:48 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00'}) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r0, r1, 0xa}, 0x10) r3 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x70, 0x40, 0x1, 0x81, 0x0, 0xae, 0x28411, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x3ff, 0x5}, 0x440, 0xffff, 0xdea, 0x6, 0x33, 0x0, 0x3}, r3, 0x2, 0xffffffffffffffff, 0x2) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r2}, 0x8) recvmsg$kcm(r4, &(0x7f0000001680)={&(0x7f0000000200)=@isdn, 0x80, &(0x7f0000001500)=[{&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x5, &(0x7f0000001580)=""/217, 0xd9}, 0x40000020) recvmsg$kcm(r4, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000016c0)}, {&(0x7f0000001700)=""/144, 0x90}, {&(0x7f00000017c0)=""/218, 0xda}], 0x3, &(0x7f0000001900)}, 0x10102) r5 = openat$cgroup_ro(r4, &(0x7f0000001980)='freezer.self_freezing\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x2, &(0x7f0000001a00)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r4}], &(0x7f0000001a40)='syzkaller\x00', 0x7fff, 0x32, &(0x7f0000001a80)=""/50, 0x40f00, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0x1, 0x7f, 0xff}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000001bc0)={r7, r8}) recvmsg(r6, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/50, 0x32}, {&(0x7f0000002c40)=""/189, 0xbd}], 0x3, &(0x7f0000002d40)}, 0x40000002) r9 = openat$cgroup_ro(r1, &(0x7f0000002dc0)='devices.list\x00', 0x0, 0x0) r10 = gettid() write$cgroup_pid(r9, &(0x7f0000002e00)=r10, 0x12) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000002e40)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r11, &(0x7f0000002e80)='devices.allow\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002f00)={&(0x7f0000002ec0)='f2fs_get_victim\x00', r8}, 0x10) [ 76.193501][ T8531] batman_adv: batadv0: Interface activated: batadv_slave_1 23:17:48 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x7, 0xb4, 0xff, 0x20, 0x0, 0xfffffffffffffff8, 0x200, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3d, 0x0, @perf_bp={&(0x7f0000000740), 0xc}, 0x100, 0x1, 0x1ff, 0x9, 0x4, 0x80, 0x5}, 0xffffffffffffffff, 0xd, r5, 0x2) openat$cgroup_devices(r5, &(0x7f0000000840)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)) mkdirat$cgroup(r5, &(0x7f00000008c0)='syz1\x00', 0x1ff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r5}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb, r5}, 0x78) 23:17:48 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000600)='GPL\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000007c0)={0x1, &(0x7f0000000640)="0e14078edde6fcf0c20726284b030b71c4aff9f3177821f8af9944e63b499d5e867526b0b739fb28d13414d9e487bd5bc422b096dbc303207374e80b9539b8fdd37848256120a16672f2c97f83468af271ff9c39b34837a70cb1aad7a2ebb2311e46f01b261d5a1e71fbecab39cae427b7ac1b7e440df8f01fc4960ea37fade74e7bc5af3c6da43f50d832a2a58a30be3805264eb35ace6bcb1e", &(0x7f0000000700)=""/144}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000800)={r0, 0x1}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={r4, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c40)={&(0x7f00000008c0)="997709f1ca154c5dbed474eab7b4e41fc8fc94c8b950c4c9871619e96a952e80303551b79f82d0e2d114b32f275d0f6cb9a55426d7f3b808b881fc3a1b6abf56fc04421d4f493ce681eb2c7d0dec1dff2b3c1fad2e1177984eaeba8a8a3d918859e524982c51441d66d0e1f5a4e382683c0913bbce600087b65b38c977914947b830a27e6afff64b30ad695969d61e7dbdace059f23ddabefcd7027cb6a76acb3fdacc82108305b4454ce2e5dc0b63d2d5b07f1c494802a4fdf149cc27ebef1d698dd9b331bcf1c6e6238f9094e4174744b72ca52007b1f82fca692a46db8078006427eaed420d8b49e9bb803d852cc73cf9f682ee3f064f50", &(0x7f00000009c0)=""/164, &(0x7f0000000a80)="bd52c092e14fb923cc2058a2b6ddaf9a9a283cdffc8d51899a238ea2609643dfe24b89059c6ddbdb60bc4928cb6301152dd36b28787d1e433f77174f31db90a3d90a816db7359b70c1e37a5539e845616c5ab3f7c9bf20639f01ba90e113598c3e4585eab8c7f5926db23f730a354c7714a94bff5ef6e50c23268229a38f399829ecfa5e48e8c0789a95cb63c6a65e8e3909bf57cbc96e0b6810dfa75c71e1f8172c56f1c7953bda384572fdb334efa3939c74eea6669741617867fc79c0a00f8446", &(0x7f0000000b80)="b28300ff7876396f2d488d568f5b5759367847e337e6c0c943dd1cbe54f66203480cb9e31776ba845064359fe9fb51d223b7273543f50439c44b7d1ce7019004266deced9ecc693ce032a2010e2af33586daeae105257ff069377e0666468be18c7169705390fa1828af6ad0990e2e38de6aee37781c01e908ad1726aa62d45af8a125ad330b6b78cab4", 0x131, r3}, 0x38) r5 = openat$cgroup_procs(r4, &(0x7f0000000c80)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000cc0)=0xffffffffffffffff, 0x12) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000d40), 0x12) [ 76.248878][ T9841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 76.261332][ T9841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 76.281365][ T8531] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.292358][ T8531] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.314132][ T8531] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.331097][ T8531] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.479130][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.505665][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.532082][ T432] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.555035][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 76.560610][ T432] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.579517][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 76.611439][ T432] BUG: sleeping function called from invalid context at net/mac80211/sta_info.c:1962 [ 76.631978][ T432] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 432, name: kworker/u4:4 [ 76.649855][ T432] 4 locks held by kworker/u4:4/432: [ 76.655208][ T432] #0: ffff88804e534138 ((wq_completion)phy14){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 76.667042][ T432] #1: ffffc9000247fda8 ((work_completion)(&sdata->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 76.692573][ T432] #2: ffff88802c920d00 (&wdev->mtx){+.+.}-{3:3}, at: ieee80211_ibss_work+0x93/0xe80 23:17:48 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000009f80)={&(0x7f0000008ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f00)=[{&(0x7f0000008b40)=""/215, 0xd7}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/145, 0x91}, {&(0x7f0000009d00)=""/66, 0x42}, {&(0x7f0000009d80)=""/71, 0x47}, {&(0x7f0000009e00)=""/253, 0xfd}], 0x6}, 0x10002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], r6, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) sendmsg(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f000000a0c0)=@ll={0x11, 0x9, r6, 0x1, 0x80, 0x6, @remote}, 0x80, &(0x7f000000a140), 0x0, &(0x7f000000a180)=[{0xe0, 0x10c, 0x1, "e2c47264d7d2a2b408fb8dc461bc632624ca141673fe0eeb41d27bc300c909a396040ef75e6d052761158df288efdf5c6987cac79d2c32e81858fc5ef7c518957531c911a9a99e88b899e7cf80de5340e519a0dbb29b045ab214a22635bf45344b4a9a9b56962dc2133d6e9a991c950e1a67bfe0e03eae026209ce90e068149392e52a30ff81a06f2bad6ceb55bdd446b6d4741c08ebaf7ae1ecde48b7236eb290b4018cd88c84807e94bd2cd96fea6e51c08dd5b8fb50c48e26cd97eb258c164894c5c847b02da9d81d7d0816"}, {0x88, 0x10d, 0x8, "d415b795992660cdaf4b8161b2a27dfe7f218fb5b95e56c179e6cc9f6bdfb5dc5ac0606452805b14896d315fc432865069a9a6eb413dd345ac8bb96b06d89f67ad60178f05729dda770cc7727ba9f9aad4fba4a3e3d45fdf2e85217cc7c1de933aef7743612fff22efb806a58619b302b6"}], 0x168}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f000000a340)='threaded\x00') 23:17:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000940)=""/61) bpf$OBJ_GET_PROG(0x7, &(0x7f00000009c0)={&(0x7f0000000980)='./file0\x00', 0x0, 0x18}, 0x10) 23:17:48 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="6018e6847e4e8ef9b6b6c34ef659469d960b24f5d6d47de3d57730da155666409a4c0b26055abe4bf34be86d27d4b97b1b74b611c1bf499b62751c461cefedf2b37239a90eca28c9e6479c53ad05ecc0250a9b83532f3c6225dd0e99316f4a1e0b65e54f7058751c7bf870c558ea61cf8336c99c4ee5e3f83580a06e001f91a6df6151fdc35ef478125e76135fcf434f2800ab99c9c778094a3f4ecdb98f4d115976383a7637de9c80f426427526ba8dee2ae15f6b43b8712011ecf86378274d93ac3402d2f16dc69bfaf7c815181292bb59ae6a0a4f8631a7877ccffb749c342fb646911a0350258f25dc6972948dc63f776ecbbf90d1464103cc4369", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) r1 = openat$cgroup_ro(r0, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000640)={'vlan0\x00', @remote}) r2 = openat$cgroup_ro(r1, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x40) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xc, 0x5}]}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @const={0xb}, @struct={0x5, 0xa, 0x0, 0x4, 0x0, 0x4, [{0xd, 0x5}, {0x3, 0x1, 0xd7c}, {0xf, 0x4, 0x5}, {0x3, 0x4, 0x40}, {0x6, 0x2, 0x8}, {0x1, 0x4, 0x2}, {0x1, 0x5, 0x3f51f6ee}, {0x7, 0x4, 0x1e}, {0x2, 0x4, 0x54}, {0x8, 0x4}]}]}, {0x0, [0x30, 0x5f]}}, &(0x7f00000007c0)=""/166, 0xcc, 0xa6, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001900)={r3, 0x10, &(0x7f00000018c0)={&(0x7f00000008c0)=""/4096, 0x1000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000019c0)=0x1) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) 23:17:48 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000600)='GPL\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000007c0)={0x1, &(0x7f0000000640)="0e14078edde6fcf0c20726284b030b71c4aff9f3177821f8af9944e63b499d5e867526b0b739fb28d13414d9e487bd5bc422b096dbc303207374e80b9539b8fdd37848256120a16672f2c97f83468af271ff9c39b34837a70cb1aad7a2ebb2311e46f01b261d5a1e71fbecab39cae427b7ac1b7e440df8f01fc4960ea37fade74e7bc5af3c6da43f50d832a2a58a30be3805264eb35ace6bcb1e", &(0x7f0000000700)=""/144}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000800)={r0, 0x1}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={r4, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c40)={&(0x7f00000008c0)="997709f1ca154c5dbed474eab7b4e41fc8fc94c8b950c4c9871619e96a952e80303551b79f82d0e2d114b32f275d0f6cb9a55426d7f3b808b881fc3a1b6abf56fc04421d4f493ce681eb2c7d0dec1dff2b3c1fad2e1177984eaeba8a8a3d918859e524982c51441d66d0e1f5a4e382683c0913bbce600087b65b38c977914947b830a27e6afff64b30ad695969d61e7dbdace059f23ddabefcd7027cb6a76acb3fdacc82108305b4454ce2e5dc0b63d2d5b07f1c494802a4fdf149cc27ebef1d698dd9b331bcf1c6e6238f9094e4174744b72ca52007b1f82fca692a46db8078006427eaed420d8b49e9bb803d852cc73cf9f682ee3f064f50", &(0x7f00000009c0)=""/164, &(0x7f0000000a80)="bd52c092e14fb923cc2058a2b6ddaf9a9a283cdffc8d51899a238ea2609643dfe24b89059c6ddbdb60bc4928cb6301152dd36b28787d1e433f77174f31db90a3d90a816db7359b70c1e37a5539e845616c5ab3f7c9bf20639f01ba90e113598c3e4585eab8c7f5926db23f730a354c7714a94bff5ef6e50c23268229a38f399829ecfa5e48e8c0789a95cb63c6a65e8e3909bf57cbc96e0b6810dfa75c71e1f8172c56f1c7953bda384572fdb334efa3939c74eea6669741617867fc79c0a00f8446", &(0x7f0000000b80)="b28300ff7876396f2d488d568f5b5759367847e337e6c0c943dd1cbe54f66203480cb9e31776ba845064359fe9fb51d223b7273543f50439c44b7d1ce7019004266deced9ecc693ce032a2010e2af33586daeae105257ff069377e0666468be18c7169705390fa1828af6ad0990e2e38de6aee37781c01e908ad1726aa62d45af8a125ad330b6b78cab4", 0x131, r3}, 0x38) r5 = openat$cgroup_procs(r4, &(0x7f0000000c80)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000cc0)=0xffffffffffffffff, 0x12) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000d40), 0x12) 23:17:48 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x7, 0xb4, 0xff, 0x20, 0x0, 0xfffffffffffffff8, 0x200, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3d, 0x0, @perf_bp={&(0x7f0000000740), 0xc}, 0x100, 0x1, 0x1ff, 0x9, 0x4, 0x80, 0x5}, 0xffffffffffffffff, 0xd, r5, 0x2) openat$cgroup_devices(r5, &(0x7f0000000840)='devices.deny\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r5}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb, r5}, 0x78) [ 76.714671][ T432] #3: ffffffff8b3372a0 (rcu_read_lock){....}-{1:2}, at: sta_info_insert_rcu+0x680/0x2ba0 [ 76.779306][ T432] Preemption disabled at: [ 76.779344][ T432] [] __mutex_lock+0x10f/0x10e0 23:17:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000940)=""/61) bpf$OBJ_GET_PROG(0x7, &(0x7f00000009c0)={&(0x7f0000000980)='./file0\x00', 0x0, 0x18}, 0x10) [ 76.839938][ T432] CPU: 1 PID: 432 Comm: kworker/u4:4 Not tainted 5.10.0-rc3-syzkaller #0 [ 76.848385][ T432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.858466][ T432] Workqueue: phy14 ieee80211_iface_work [ 76.864018][ T432] Call Trace: [ 76.867319][ T432] dump_stack+0x107/0x163 [ 76.871660][ T432] ? __mutex_lock+0x10f/0x10e0 [ 76.876433][ T432] ___might_sleep.cold+0x1e8/0x22e [ 76.881558][ T432] sta_info_move_state+0x32/0x8d0 23:17:48 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="3dee4aab90b8fdc01c7260671a2242861707e253b42b07bfab7a821c586298d948acf7b7edf9aa0b63065dd284c02594609a8f933413d0ae14d370214139ff42e7d6cf33f8b002584caff0dc7348df39879874b80f6b027ff18f9fde0bc9bbeed0d5e6cd340e02a58b0a169c4ea0c4931f801ffedfe288b890e4a2dd4132e347b05fd2be101601da38b1e0aeff57b26f011ba39b2a65c037eef6f938780042d31b23ce7665a1720af33a586b706e462a5a781c2eedd9d9dbe13cb441a8524729f4f8be69c5a49df924ab0320043be5af61aec88d5812780831ff6b50ca45bc622d069b275b42e9117eecb047a9d3d9df96aa6dee123764933081c3e438b4", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000009f80)={&(0x7f0000008ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f00)=[{&(0x7f0000008b40)=""/215, 0xd7}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/145, 0x91}, {&(0x7f0000009d00)=""/66, 0x42}, {&(0x7f0000009d80)=""/71, 0x47}, {&(0x7f0000009e00)=""/253, 0xfd}], 0x6}, 0x10002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], r6, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) sendmsg(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f000000a0c0)=@ll={0x11, 0x9, r6, 0x1, 0x80, 0x6, @remote}, 0x80, &(0x7f000000a140), 0x0, &(0x7f000000a180)=[{0xe0, 0x10c, 0x1, "e2c47264d7d2a2b408fb8dc461bc632624ca141673fe0eeb41d27bc300c909a396040ef75e6d052761158df288efdf5c6987cac79d2c32e81858fc5ef7c518957531c911a9a99e88b899e7cf80de5340e519a0dbb29b045ab214a22635bf45344b4a9a9b56962dc2133d6e9a991c950e1a67bfe0e03eae026209ce90e068149392e52a30ff81a06f2bad6ceb55bdd446b6d4741c08ebaf7ae1ecde48b7236eb290b4018cd88c84807e94bd2cd96fea6e51c08dd5b8fb50c48e26cd97eb258c164894c5c847b02da9d81d7d0816"}, {0x88, 0x10d, 0x8, "d415b795992660cdaf4b8161b2a27dfe7f218fb5b95e56c179e6cc9f6bdfb5dc5ac0606452805b14896d315fc432865069a9a6eb413dd345ac8bb96b06d89f67ad60178f05729dda770cc7727ba9f9aad4fba4a3e3d45fdf2e85217cc7c1de933aef7743612fff22efb806a58619b302b6"}], 0x168}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f000000a340)='threaded\x00') [ 76.886600][ T432] sta_info_free+0x65/0x3b0 [ 76.891125][ T432] sta_info_insert_rcu+0x303/0x2ba0 [ 76.896335][ T432] ? find_held_lock+0x2d/0x110 [ 76.901113][ T432] ? rate_control_rate_init+0x32c/0x6a0 [ 76.906680][ T432] ? sta_info_free+0x3b0/0x3b0 [ 76.911456][ T432] ? __local_bh_enable_ip+0x9c/0x110 [ 76.916753][ T432] ? rate_control_rate_init+0x35f/0x6a0 [ 76.922310][ T432] ieee80211_ibss_finish_sta+0x212/0x390 [ 76.927950][ T432] ? ieee80211_ibss_build_presp+0x15f0/0x15f0 [ 76.934033][ T432] ? __local_bh_enable_ip+0x9c/0x110 [ 76.939344][ T432] ieee80211_ibss_work+0x2c7/0xe80 [ 76.944475][ T432] ? ieee80211_ibss_rx_queued_mgmt+0x1870/0x1870 [ 76.950820][ T432] ? mark_held_locks+0x9f/0xe0 [ 76.955602][ T432] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 76.961630][ T432] ? lockdep_hardirqs_on+0x79/0x100 [ 76.966843][ T432] ? _raw_spin_unlock_irqrestore+0x2f/0x50 [ 76.972667][ T432] ieee80211_iface_work+0x91f/0xa90 [ 76.977886][ T432] process_one_work+0x933/0x15a0 [ 76.982845][ T432] ? lock_release+0x710/0x710 23:17:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000940)=""/61) bpf$OBJ_GET_PROG(0x7, &(0x7f00000009c0)={&(0x7f0000000980)='./file0\x00', 0x0, 0x18}, 0x10) [ 76.987529][ T432] ? pwq_dec_nr_in_flight+0x320/0x320 [ 76.992913][ T432] ? rwlock_bug.part.0+0x90/0x90 [ 76.997863][ T432] ? _raw_spin_lock_irq+0x41/0x50 [ 77.002909][ T432] worker_thread+0x64c/0x1120 [ 77.007609][ T432] ? __kthread_parkme+0x13f/0x1e0 [ 77.012744][ T432] ? process_one_work+0x15a0/0x15a0 [ 77.017956][ T432] kthread+0x3af/0x4a0 [ 77.022037][ T432] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 77.027944][ T432] ret_from_fork+0x1f/0x30 23:17:49 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x7, 0xb4, 0xff, 0x20, 0x0, 0xfffffffffffffff8, 0x200, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3d, 0x0, @perf_bp={&(0x7f0000000740), 0xc}, 0x100, 0x1, 0x1ff, 0x9, 0x4, 0x80, 0x5}, 0xffffffffffffffff, 0xd, r5, 0x2) openat$cgroup_devices(r5, &(0x7f0000000840)='devices.deny\x00', 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r5}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb, r5}, 0x78) 23:17:49 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00'}) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r0, r1, 0xa}, 0x10) r3 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x70, 0x40, 0x1, 0x81, 0x0, 0xae, 0x28411, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x3ff, 0x5}, 0x440, 0xffff, 0xdea, 0x6, 0x33, 0x0, 0x3}, r3, 0x2, 0xffffffffffffffff, 0x2) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r2}, 0x8) recvmsg$kcm(r4, &(0x7f0000001680)={&(0x7f0000000200)=@isdn, 0x80, &(0x7f0000001500)=[{&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x5, &(0x7f0000001580)=""/217, 0xd9}, 0x40000020) recvmsg$kcm(r4, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000016c0)}, {&(0x7f0000001700)=""/144, 0x90}, {&(0x7f00000017c0)=""/218, 0xda}], 0x3, &(0x7f0000001900)}, 0x10102) r5 = openat$cgroup_ro(r4, &(0x7f0000001980)='freezer.self_freezing\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x2, &(0x7f0000001a00)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r4}], &(0x7f0000001a40)='syzkaller\x00', 0x7fff, 0x32, &(0x7f0000001a80)=""/50, 0x40f00, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0x1, 0x7f, 0xff}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000001bc0)={r7, r8}) recvmsg(r6, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/50, 0x32}, {&(0x7f0000002c40)=""/189, 0xbd}], 0x3, &(0x7f0000002d40)}, 0x40000002) r9 = openat$cgroup_ro(r1, &(0x7f0000002dc0)='devices.list\x00', 0x0, 0x0) r10 = gettid() write$cgroup_pid(r9, &(0x7f0000002e00)=r10, 0x12) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000002e40)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r11, &(0x7f0000002e80)='devices.allow\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002f00)={&(0x7f0000002ec0)='f2fs_get_victim\x00', r8}, 0x10) 23:17:49 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) r1 = openat$cgroup_ro(r0, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000640)={'vlan0\x00', @remote}) r2 = openat$cgroup_ro(r1, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x40) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xc, 0x5}]}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @const={0xb}, @struct={0x5, 0xa, 0x0, 0x4, 0x0, 0x4, [{0xd, 0x5}, {0x3, 0x1, 0xd7c}, {0xf, 0x4, 0x5}, {0x3, 0x4, 0x40}, {0x6, 0x2, 0x8}, {0x1, 0x4, 0x2}, {0x1, 0x5, 0x3f51f6ee}, {0x7, 0x4, 0x1e}, {0x2, 0x4, 0x54}, {0x8, 0x4}]}]}, {0x0, [0x30, 0x5f]}}, &(0x7f00000007c0)=""/166, 0xcc, 0xa6, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001900)={r3, 0x10, &(0x7f00000018c0)={&(0x7f00000008c0)=""/4096, 0x1000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000019c0)=0x1) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) 23:17:49 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000600)='GPL\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000007c0)={0x1, &(0x7f0000000640)="0e14078edde6fcf0c20726284b030b71c4aff9f3177821f8af9944e63b499d5e867526b0b739fb28d13414d9e487bd5bc422b096dbc303207374e80b9539b8fdd37848256120a16672f2c97f83468af271ff9c39b34837a70cb1aad7a2ebb2311e46f01b261d5a1e71fbecab39cae427b7ac1b7e440df8f01fc4960ea37fade74e7bc5af3c6da43f50d832a2a58a30be3805264eb35ace6bcb1e", &(0x7f0000000700)=""/144}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000800)={r0, 0x1}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={r4, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c40)={&(0x7f00000008c0)="997709f1ca154c5dbed474eab7b4e41fc8fc94c8b950c4c9871619e96a952e80303551b79f82d0e2d114b32f275d0f6cb9a55426d7f3b808b881fc3a1b6abf56fc04421d4f493ce681eb2c7d0dec1dff2b3c1fad2e1177984eaeba8a8a3d918859e524982c51441d66d0e1f5a4e382683c0913bbce600087b65b38c977914947b830a27e6afff64b30ad695969d61e7dbdace059f23ddabefcd7027cb6a76acb3fdacc82108305b4454ce2e5dc0b63d2d5b07f1c494802a4fdf149cc27ebef1d698dd9b331bcf1c6e6238f9094e4174744b72ca52007b1f82fca692a46db8078006427eaed420d8b49e9bb803d852cc73cf9f682ee3f064f50", &(0x7f00000009c0)=""/164, &(0x7f0000000a80)="bd52c092e14fb923cc2058a2b6ddaf9a9a283cdffc8d51899a238ea2609643dfe24b89059c6ddbdb60bc4928cb6301152dd36b28787d1e433f77174f31db90a3d90a816db7359b70c1e37a5539e845616c5ab3f7c9bf20639f01ba90e113598c3e4585eab8c7f5926db23f730a354c7714a94bff5ef6e50c23268229a38f399829ecfa5e48e8c0789a95cb63c6a65e8e3909bf57cbc96e0b6810dfa75c71e1f8172c56f1c7953bda384572fdb334efa3939c74eea6669741617867fc79c0a00f8446", &(0x7f0000000b80)="b28300ff7876396f2d488d568f5b5759367847e337e6c0c943dd1cbe54f66203480cb9e31776ba845064359fe9fb51d223b7273543f50439c44b7d1ce7019004266deced9ecc693ce032a2010e2af33586daeae105257ff069377e0666468be18c7169705390fa1828af6ad0990e2e38de6aee37781c01e908ad1726aa62d45af8a125ad330b6b78cab4", 0x131, r3}, 0x38) r5 = openat$cgroup_procs(r4, &(0x7f0000000c80)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000cc0)=0xffffffffffffffff, 0x12) 23:17:49 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x7, 0xb4, 0xff, 0x20, 0x0, 0xfffffffffffffff8, 0x200, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3d, 0x0, @perf_bp={&(0x7f0000000740), 0xc}, 0x100, 0x1, 0x1ff, 0x9, 0x4, 0x80, 0x5}, 0xffffffffffffffff, 0xd, r5, 0x2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r5}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb, r5}, 0x78) 23:17:49 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000009f80)={&(0x7f0000008ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f00)=[{&(0x7f0000008b40)=""/215, 0xd7}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/145, 0x91}, {&(0x7f0000009d00)=""/66, 0x42}, {&(0x7f0000009d80)=""/71, 0x47}, {&(0x7f0000009e00)=""/253, 0xfd}], 0x6}, 0x10002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], r6, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) sendmsg(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f000000a0c0)=@ll={0x11, 0x9, r6, 0x1, 0x80, 0x6, @remote}, 0x80, &(0x7f000000a140), 0x0, &(0x7f000000a180)=[{0xe0, 0x10c, 0x1, "e2c47264d7d2a2b408fb8dc461bc632624ca141673fe0eeb41d27bc300c909a396040ef75e6d052761158df288efdf5c6987cac79d2c32e81858fc5ef7c518957531c911a9a99e88b899e7cf80de5340e519a0dbb29b045ab214a22635bf45344b4a9a9b56962dc2133d6e9a991c950e1a67bfe0e03eae026209ce90e068149392e52a30ff81a06f2bad6ceb55bdd446b6d4741c08ebaf7ae1ecde48b7236eb290b4018cd88c84807e94bd2cd96fea6e51c08dd5b8fb50c48e26cd97eb258c164894c5c847b02da9d81d7d0816"}, {0x88, 0x10d, 0x8, "d415b795992660cdaf4b8161b2a27dfe7f218fb5b95e56c179e6cc9f6bdfb5dc5ac0606452805b14896d315fc432865069a9a6eb413dd345ac8bb96b06d89f67ad60178f05729dda770cc7727ba9f9aad4fba4a3e3d45fdf2e85217cc7c1de933aef7743612fff22efb806a58619b302b6"}], 0x168}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f000000a340)='threaded\x00') 23:17:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000940)=""/61) 23:17:49 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000600)='GPL\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000007c0)={0x1, &(0x7f0000000640)="0e14078edde6fcf0c20726284b030b71c4aff9f3177821f8af9944e63b499d5e867526b0b739fb28d13414d9e487bd5bc422b096dbc303207374e80b9539b8fdd37848256120a16672f2c97f83468af271ff9c39b34837a70cb1aad7a2ebb2311e46f01b261d5a1e71fbecab39cae427b7ac1b7e440df8f01fc4960ea37fade74e7bc5af3c6da43f50d832a2a58a30be3805264eb35ace6bcb1e", &(0x7f0000000700)=""/144}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000800)={r0, 0x1}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={r4, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c40)={&(0x7f00000008c0)="997709f1ca154c5dbed474eab7b4e41fc8fc94c8b950c4c9871619e96a952e80303551b79f82d0e2d114b32f275d0f6cb9a55426d7f3b808b881fc3a1b6abf56fc04421d4f493ce681eb2c7d0dec1dff2b3c1fad2e1177984eaeba8a8a3d918859e524982c51441d66d0e1f5a4e382683c0913bbce600087b65b38c977914947b830a27e6afff64b30ad695969d61e7dbdace059f23ddabefcd7027cb6a76acb3fdacc82108305b4454ce2e5dc0b63d2d5b07f1c494802a4fdf149cc27ebef1d698dd9b331bcf1c6e6238f9094e4174744b72ca52007b1f82fca692a46db8078006427eaed420d8b49e9bb803d852cc73cf9f682ee3f064f50", &(0x7f00000009c0)=""/164, &(0x7f0000000a80)="bd52c092e14fb923cc2058a2b6ddaf9a9a283cdffc8d51899a238ea2609643dfe24b89059c6ddbdb60bc4928cb6301152dd36b28787d1e433f77174f31db90a3d90a816db7359b70c1e37a5539e845616c5ab3f7c9bf20639f01ba90e113598c3e4585eab8c7f5926db23f730a354c7714a94bff5ef6e50c23268229a38f399829ecfa5e48e8c0789a95cb63c6a65e8e3909bf57cbc96e0b6810dfa75c71e1f8172c56f1c7953bda384572fdb334efa3939c74eea6669741617867fc79c0a00f8446", &(0x7f0000000b80)="b28300ff7876396f2d488d568f5b5759367847e337e6c0c943dd1cbe54f66203480cb9e31776ba845064359fe9fb51d223b7273543f50439c44b7d1ce7019004266deced9ecc693ce032a2010e2af33586daeae105257ff069377e0666468be18c7169705390fa1828af6ad0990e2e38de6aee37781c01e908ad1726aa62d45af8a125ad330b6b78cab4", 0x131, r3}, 0x38) openat$cgroup_procs(r4, &(0x7f0000000c80)='cgroup.procs\x00', 0x2, 0x0) 23:17:49 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) r1 = openat$cgroup_ro(r0, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000640)={'vlan0\x00', @remote}) r2 = openat$cgroup_ro(r1, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x40) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xc, 0x5}]}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @const={0xb}, @struct={0x5, 0xa, 0x0, 0x4, 0x0, 0x4, [{0xd, 0x5}, {0x3, 0x1, 0xd7c}, {0xf, 0x4, 0x5}, {0x3, 0x4, 0x40}, {0x6, 0x2, 0x8}, {0x1, 0x4, 0x2}, {0x1, 0x5, 0x3f51f6ee}, {0x7, 0x4, 0x1e}, {0x2, 0x4, 0x54}, {0x8, 0x4}]}]}, {0x0, [0x30, 0x5f]}}, &(0x7f00000007c0)=""/166, 0xcc, 0xa6, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001900)={r3, 0x10, &(0x7f00000018c0)={&(0x7f00000008c0)=""/4096, 0x1000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000019c0)=0x1) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) 23:17:49 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000009f80)={&(0x7f0000008ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f00)=[{&(0x7f0000008b40)=""/215, 0xd7}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/145, 0x91}, {&(0x7f0000009d00)=""/66, 0x42}, {&(0x7f0000009d80)=""/71, 0x47}, {&(0x7f0000009e00)=""/253, 0xfd}], 0x6}, 0x10002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], r6, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) sendmsg(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f000000a0c0)=@ll={0x11, 0x9, r6, 0x1, 0x80, 0x6, @remote}, 0x80, &(0x7f000000a140), 0x0, &(0x7f000000a180)=[{0xe0, 0x10c, 0x1, "e2c47264d7d2a2b408fb8dc461bc632624ca141673fe0eeb41d27bc300c909a396040ef75e6d052761158df288efdf5c6987cac79d2c32e81858fc5ef7c518957531c911a9a99e88b899e7cf80de5340e519a0dbb29b045ab214a22635bf45344b4a9a9b56962dc2133d6e9a991c950e1a67bfe0e03eae026209ce90e068149392e52a30ff81a06f2bad6ceb55bdd446b6d4741c08ebaf7ae1ecde48b7236eb290b4018cd88c84807e94bd2cd96fea6e51c08dd5b8fb50c48e26cd97eb258c164894c5c847b02da9d81d7d0816"}, {0x88, 0x10d, 0x8, "d415b795992660cdaf4b8161b2a27dfe7f218fb5b95e56c179e6cc9f6bdfb5dc5ac0606452805b14896d315fc432865069a9a6eb413dd345ac8bb96b06d89f67ad60178f05729dda770cc7727ba9f9aad4fba4a3e3d45fdf2e85217cc7c1de933aef7743612fff22efb806a58619b302b6"}], 0x168}, 0x40) 23:17:49 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r5}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb, r5}, 0x78) 23:17:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) 23:17:49 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) r1 = openat$cgroup_ro(r0, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000640)={'vlan0\x00', @remote}) r2 = openat$cgroup_ro(r1, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x40) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xc, 0x5}]}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @const={0xb}, @struct={0x5, 0xa, 0x0, 0x4, 0x0, 0x4, [{0xd, 0x5}, {0x3, 0x1, 0xd7c}, {0xf, 0x4, 0x5}, {0x3, 0x4, 0x40}, {0x6, 0x2, 0x8}, {0x1, 0x4, 0x2}, {0x1, 0x5, 0x3f51f6ee}, {0x7, 0x4, 0x1e}, {0x2, 0x4, 0x54}, {0x8, 0x4}]}]}, {0x0, [0x30, 0x5f]}}, &(0x7f00000007c0)=""/166, 0xcc, 0xa6, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001900)={r3, 0x10, &(0x7f00000018c0)={&(0x7f00000008c0)=""/4096, 0x1000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000019c0)=0x1) [ 77.666905][ T432] BUG: sleeping function called from invalid context at net/mac80211/sta_info.c:1962 [ 77.677512][ T432] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 432, name: kworker/u4:4 [ 77.687305][ T432] 4 locks held by kworker/u4:4/432: [ 77.695816][ T432] #0: ffff88804e534138 ((wq_completion)phy14){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 77.717485][ T432] #1: ffffc9000247fda8 ((work_completion)(&sdata->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 77.740547][ T432] #2: ffff88802c920d00 (&wdev->mtx){+.+.}-{3:3}, at: ieee80211_ibss_work+0x93/0xe80 [ 77.760467][ T432] #3: ffffffff8b3372a0 (rcu_read_lock){....}-{1:2}, at: sta_info_insert_rcu+0x680/0x2ba0 [ 77.772963][ T432] Preemption disabled at: [ 77.772986][ T432] [<0000000000000000>] 0x0 [ 77.784774][ T432] CPU: 0 PID: 432 Comm: kworker/u4:4 Tainted: G W 5.10.0-rc3-syzkaller #0 [ 77.794591][ T432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.804663][ T432] Workqueue: phy14 ieee80211_iface_work [ 77.810211][ T432] Call Trace: [ 77.813518][ T432] dump_stack+0x107/0x163 [ 77.817866][ T432] ___might_sleep.cold+0x1e8/0x22e [ 77.822990][ T432] sta_info_move_state+0x32/0x8d0 [ 77.828030][ T432] sta_info_free+0x65/0x3b0 [ 77.832552][ T432] sta_info_insert_rcu+0x303/0x2ba0 [ 77.837759][ T432] ? find_held_lock+0x2d/0x110 [ 77.842536][ T432] ? rate_control_rate_init+0x32c/0x6a0 [ 77.848095][ T432] ? sta_info_free+0x3b0/0x3b0 [ 77.852868][ T432] ? __local_bh_enable_ip+0x9c/0x110 [ 77.858167][ T432] ? rate_control_rate_init+0x35f/0x6a0 [ 77.863727][ T432] ieee80211_ibss_finish_sta+0x212/0x390 [ 77.869371][ T432] ? ieee80211_ibss_build_presp+0x15f0/0x15f0 [ 77.875447][ T432] ? __local_bh_enable_ip+0x9c/0x110 [ 77.880744][ T432] ieee80211_ibss_work+0x2c7/0xe80 [ 77.885874][ T432] ? ieee80211_ibss_rx_queued_mgmt+0x1870/0x1870 [ 77.892213][ T432] ? mark_held_locks+0x9f/0xe0 [ 77.896986][ T432] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 77.902806][ T432] ? lockdep_hardirqs_on+0x79/0x100 [ 77.908010][ T432] ? _raw_spin_unlock_irqrestore+0x2f/0x50 [ 77.913831][ T432] ieee80211_iface_work+0x91f/0xa90 [ 77.919054][ T432] process_one_work+0x933/0x15a0 [ 77.924007][ T432] ? lock_release+0x710/0x710 [ 77.928695][ T432] ? pwq_dec_nr_in_flight+0x320/0x320 [ 77.934118][ T432] ? rwlock_bug.part.0+0x90/0x90 [ 77.939083][ T432] ? _raw_spin_lock_irq+0x41/0x50 [ 77.944139][ T432] worker_thread+0x64c/0x1120 [ 77.948836][ T432] ? __kthread_parkme+0x13f/0x1e0 [ 77.953866][ T432] ? process_one_work+0x15a0/0x15a0 [ 77.959074][ T432] kthread+0x3af/0x4a0 [ 77.963145][ T432] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 77.969055][ T432] ret_from_fork+0x1f/0x30 [ 77.998983][ T432] [ 78.001334][ T432] ============================= [ 78.006170][ T432] [ BUG: Invalid wait context ] [ 78.011123][ T432] 5.10.0-rc3-syzkaller #0 Tainted: G W [ 78.017873][ T432] ----------------------------- [ 78.022716][ T432] kworker/u4:4/432 is trying to lock: [ 78.028075][ T432] ffff8880523429d0 (&local->chanctx_mtx){+.+.}-{3:3}, at: ieee80211_recalc_min_chandef+0x49/0x140 [ 78.038766][ T432] other info that might help us debug this: [ 78.044650][ T432] context-{4:4} [ 78.048099][ T432] 4 locks held by kworker/u4:4/432: [ 78.053278][ T432] #0: ffff88804e534138 ((wq_completion)phy14){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 78.063534][ T432] #1: ffffc9000247fda8 ((work_completion)(&sdata->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 78.074749][ T432] #2: ffff88802c920d00 (&wdev->mtx){+.+.}-{3:3}, at: ieee80211_ibss_work+0x93/0xe80 [ 78.084234][ T432] #3: ffffffff8b3372a0 (rcu_read_lock){....}-{1:2}, at: sta_info_insert_rcu+0x680/0x2ba0 [ 78.094153][ T432] stack backtrace: [ 78.097873][ T432] CPU: 0 PID: 432 Comm: kworker/u4:4 Tainted: G W 5.10.0-rc3-syzkaller #0 [ 78.107664][ T432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.117724][ T432] Workqueue: phy14 ieee80211_iface_work [ 78.123301][ T432] Call Trace: [ 78.126587][ T432] dump_stack+0x107/0x163 [ 78.130913][ T432] __lock_acquire.cold+0x310/0x3a2 [ 78.136033][ T432] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 78.142019][ T432] ? finish_task_switch+0x150/0x7a0 [ 78.147220][ T432] lock_acquire+0x2a3/0x8c0 [ 78.151729][ T432] ? ieee80211_recalc_min_chandef+0x49/0x140 [ 78.157705][ T432] ? lock_release+0x710/0x710 [ 78.162377][ T432] ? finish_task_switch+0x150/0x7a0 [ 78.167570][ T432] ? finish_task_switch+0x122/0x7a0 [ 78.172763][ T432] ? __switch_to+0x57c/0x1050 [ 78.177445][ T432] __mutex_lock+0x134/0x10e0 [ 78.182039][ T432] ? ieee80211_recalc_min_chandef+0x49/0x140 [ 78.188027][ T432] ? mark_held_locks+0x9f/0xe0 [ 78.192789][ T432] ? ieee80211_recalc_min_chandef+0x49/0x140 [ 78.198769][ T432] ? asm_sysvec_reschedule_ipi+0x12/0x20 [ 78.204401][ T432] ? mutex_lock_io_nested+0xf60/0xf60 [ 78.209769][ T432] ? lockdep_hardirqs_on+0x79/0x100 [ 78.214961][ T432] ? asm_sysvec_reschedule_ipi+0x12/0x20 [ 78.220588][ T432] ? mark_lock+0xf7/0x24c0 [ 78.224999][ T432] ? dump_stack+0x157/0x163 [ 78.229499][ T432] ? dump_stack+0x15a/0x163 [ 78.234000][ T432] ieee80211_recalc_min_chandef+0x49/0x140 [ 78.239803][ T432] sta_info_move_state+0x3cf/0x8d0 [ 78.244911][ T432] sta_info_free+0x65/0x3b0 [ 78.249409][ T432] sta_info_insert_rcu+0x303/0x2ba0 [ 78.254599][ T432] ? find_held_lock+0x2d/0x110 [ 78.259360][ T432] ? rate_control_rate_init+0x32c/0x6a0 [ 78.264899][ T432] ? sta_info_free+0x3b0/0x3b0 [ 78.269656][ T432] ? __local_bh_enable_ip+0x9c/0x110 [ 78.274941][ T432] ? rate_control_rate_init+0x35f/0x6a0 [ 78.280486][ T432] ieee80211_ibss_finish_sta+0x212/0x390 [ 78.286113][ T432] ? ieee80211_ibss_build_presp+0x15f0/0x15f0 [ 78.292178][ T432] ? __local_bh_enable_ip+0x9c/0x110 [ 78.297461][ T432] ieee80211_ibss_work+0x2c7/0xe80 [ 78.302573][ T432] ? ieee80211_ibss_rx_queued_mgmt+0x1870/0x1870 [ 78.308900][ T432] ? mark_held_locks+0x9f/0xe0 [ 78.313663][ T432] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 78.319466][ T432] ? lockdep_hardirqs_on+0x79/0x100 [ 78.324665][ T432] ? _raw_spin_unlock_irqrestore+0x2f/0x50 [ 78.330471][ T432] ieee80211_iface_work+0x91f/0xa90 [ 78.335670][ T432] process_one_work+0x933/0x15a0 [ 78.340640][ T432] ? lock_release+0x710/0x710 [ 78.345319][ T432] ? pwq_dec_nr_in_flight+0x320/0x320 [ 78.350687][ T432] ? rwlock_bug.part.0+0x90/0x90 [ 78.355622][ T432] ? _raw_spin_lock_irq+0x41/0x50 [ 78.360642][ T432] worker_thread+0x64c/0x1120 [ 78.365322][ T432] ? __kthread_parkme+0x13f/0x1e0 [ 78.370342][ T432] ? process_one_work+0x15a0/0x15a0 [ 78.375540][ T432] kthread+0x3af/0x4a0 [ 78.379612][ T432] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 78.385503][ T432] ret_from_fork+0x1f/0x30 23:17:50 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00'}) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r0, r1, 0xa}, 0x10) r3 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x70, 0x40, 0x1, 0x81, 0x0, 0xae, 0x28411, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x3ff, 0x5}, 0x440, 0xffff, 0xdea, 0x6, 0x33, 0x0, 0x3}, r3, 0x2, 0xffffffffffffffff, 0x2) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r2}, 0x8) recvmsg$kcm(r4, &(0x7f0000001680)={&(0x7f0000000200)=@isdn, 0x80, &(0x7f0000001500)=[{&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x5, &(0x7f0000001580)=""/217, 0xd9}, 0x40000020) recvmsg$kcm(r4, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000016c0)}, {&(0x7f0000001700)=""/144, 0x90}, {&(0x7f00000017c0)=""/218, 0xda}], 0x3, &(0x7f0000001900)}, 0x10102) r5 = openat$cgroup_ro(r4, &(0x7f0000001980)='freezer.self_freezing\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x2, &(0x7f0000001a00)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r4}], &(0x7f0000001a40)='syzkaller\x00', 0x7fff, 0x32, &(0x7f0000001a80)=""/50, 0x40f00, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0x1, 0x7f, 0xff}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000001bc0)={r7, r8}) recvmsg(r6, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/50, 0x32}, {&(0x7f0000002c40)=""/189, 0xbd}], 0x3, &(0x7f0000002d40)}, 0x40000002) r9 = openat$cgroup_ro(r1, &(0x7f0000002dc0)='devices.list\x00', 0x0, 0x0) r10 = gettid() write$cgroup_pid(r9, &(0x7f0000002e00)=r10, 0x12) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000002e40)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r11, &(0x7f0000002e80)='devices.allow\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002f00)={&(0x7f0000002ec0)='f2fs_get_victim\x00', r8}, 0x10) 23:17:50 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000600)='GPL\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000007c0)={0x1, &(0x7f0000000640)="0e14078edde6fcf0c20726284b030b71c4aff9f3177821f8af9944e63b499d5e867526b0b739fb28d13414d9e487bd5bc422b096dbc303207374e80b9539b8fdd37848256120a16672f2c97f83468af271ff9c39b34837a70cb1aad7a2ebb2311e46f01b261d5a1e71fbecab39cae427b7ac1b7e440df8f01fc4960ea37fade74e7bc5af3c6da43f50d832a2a58a30be3805264eb35ace6bcb1e", &(0x7f0000000700)=""/144}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000800)={r0, 0x1}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={r4, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c40)={&(0x7f00000008c0)="997709f1ca154c5dbed474eab7b4e41fc8fc94c8b950c4c9871619e96a952e80303551b79f82d0e2d114b32f275d0f6cb9a55426d7f3b808b881fc3a1b6abf56fc04421d4f493ce681eb2c7d0dec1dff2b3c1fad2e1177984eaeba8a8a3d918859e524982c51441d66d0e1f5a4e382683c0913bbce600087b65b38c977914947b830a27e6afff64b30ad695969d61e7dbdace059f23ddabefcd7027cb6a76acb3fdacc82108305b4454ce2e5dc0b63d2d5b07f1c494802a4fdf149cc27ebef1d698dd9b331bcf1c6e6238f9094e4174744b72ca52007b1f82fca692a46db8078006427eaed420d8b49e9bb803d852cc73cf9f682ee3f064f50", &(0x7f00000009c0)=""/164, &(0x7f0000000a80)="bd52c092e14fb923cc2058a2b6ddaf9a9a283cdffc8d51899a238ea2609643dfe24b89059c6ddbdb60bc4928cb6301152dd36b28787d1e433f77174f31db90a3d90a816db7359b70c1e37a5539e845616c5ab3f7c9bf20639f01ba90e113598c3e4585eab8c7f5926db23f730a354c7714a94bff5ef6e50c23268229a38f399829ecfa5e48e8c0789a95cb63c6a65e8e3909bf57cbc96e0b6810dfa75c71e1f8172c56f1c7953bda384572fdb334efa3939c74eea6669741617867fc79c0a00f8446", &(0x7f0000000b80)="b28300ff7876396f2d488d568f5b5759367847e337e6c0c943dd1cbe54f66203480cb9e31776ba845064359fe9fb51d223b7273543f50439c44b7d1ce7019004266deced9ecc693ce032a2010e2af33586daeae105257ff069377e0666468be18c7169705390fa1828af6ad0990e2e38de6aee37781c01e908ad1726aa62d45af8a125ad330b6b78cab4", 0x131, r3}, 0x38) 23:17:50 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ldst={0x1, 0x2, 0x2, 0x7, 0x5, 0x2, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x6f}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @jmp={0x5, 0x1, 0x4, 0xa, 0x6, 0x6, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xab}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000540)='syzkaller\x00', 0xfffffffa, 0xc0, &(0x7f0000000580)=""/192, 0x40f00, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xf, 0x1, 0xe6c}, 0x10}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb}, 0x78) 23:17:50 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000009f80)={&(0x7f0000008ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f00)=[{&(0x7f0000008b40)=""/215, 0xd7}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/145, 0x91}, {&(0x7f0000009d00)=""/66, 0x42}, {&(0x7f0000009d80)=""/71, 0x47}, {&(0x7f0000009e00)=""/253, 0xfd}], 0x6}, 0x10002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], r6, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) 23:17:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) 23:17:50 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) r1 = openat$cgroup_ro(r0, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000640)={'vlan0\x00', @remote}) r2 = openat$cgroup_ro(r1, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x40) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xc, 0x5}]}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @const={0xb}, @struct={0x5, 0xa, 0x0, 0x4, 0x0, 0x4, [{0xd, 0x5}, {0x3, 0x1, 0xd7c}, {0xf, 0x4, 0x5}, {0x3, 0x4, 0x40}, {0x6, 0x2, 0x8}, {0x1, 0x4, 0x2}, {0x1, 0x5, 0x3f51f6ee}, {0x7, 0x4, 0x1e}, {0x2, 0x4, 0x54}, {0x8, 0x4}]}]}, {0x0, [0x30, 0x5f]}}, &(0x7f00000007c0)=""/166, 0xcc, 0xa6, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001900)={r3, 0x10, &(0x7f00000018c0)={&(0x7f00000008c0)=""/4096, 0x1000}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:50 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3ff, 0x7781f57d70184d16}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb}, 0x78) 23:17:50 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000600)='GPL\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000007c0)={0x1, &(0x7f0000000640)="0e14078edde6fcf0c20726284b030b71c4aff9f3177821f8af9944e63b499d5e867526b0b739fb28d13414d9e487bd5bc422b096dbc303207374e80b9539b8fdd37848256120a16672f2c97f83468af271ff9c39b34837a70cb1aad7a2ebb2311e46f01b261d5a1e71fbecab39cae427b7ac1b7e440df8f01fc4960ea37fade74e7bc5af3c6da43f50d832a2a58a30be3805264eb35ace6bcb1e", &(0x7f0000000700)=""/144}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000800)={r0, 0x1}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={r3, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) 23:17:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) 23:17:50 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) r1 = openat$cgroup_ro(r0, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000640)={'vlan0\x00', @remote}) r2 = openat$cgroup_ro(r1, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xc, 0x5}]}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @const={0xb}, @struct={0x5, 0xa, 0x0, 0x4, 0x0, 0x4, [{0xd, 0x5}, {0x3, 0x1, 0xd7c}, {0xf, 0x4, 0x5}, {0x3, 0x4, 0x40}, {0x6, 0x2, 0x8}, {0x1, 0x4, 0x2}, {0x1, 0x5, 0x3f51f6ee}, {0x7, 0x4, 0x1e}, {0x2, 0x4, 0x54}, {0x8, 0x4}]}]}, {0x0, [0x30, 0x5f]}}, &(0x7f00000007c0)=""/166, 0xcc, 0xa6, 0x1}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:50 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000009f80)={&(0x7f0000008ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f00)=[{&(0x7f0000008b40)=""/215, 0xd7}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/145, 0x91}, {&(0x7f0000009d00)=""/66, 0x42}, {&(0x7f0000009d80)=""/71, 0x47}, {&(0x7f0000009e00)=""/253, 0xfd}], 0x6}, 0x10002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], r6, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) 23:17:50 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000600)='GPL\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000007c0)={0x1, &(0x7f0000000640)="0e14078edde6fcf0c20726284b030b71c4aff9f3177821f8af9944e63b499d5e867526b0b739fb28d13414d9e487bd5bc422b096dbc303207374e80b9539b8fdd37848256120a16672f2c97f83468af271ff9c39b34837a70cb1aad7a2ebb2311e46f01b261d5a1e71fbecab39cae427b7ac1b7e440df8f01fc4960ea37fade74e7bc5af3c6da43f50d832a2a58a30be3805264eb35ace6bcb1e", &(0x7f0000000700)=""/144}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={r3, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) [ 78.691336][ T432] BUG: sleeping function called from invalid context at net/mac80211/sta_info.c:1962 [ 78.739619][ T432] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 432, name: kworker/u4:4 [ 78.748743][ T432] INFO: lockdep is turned off. [ 78.763948][ T432] Preemption disabled at: [ 78.763973][ T432] [] preempt_schedule_thunk+0x16/0x18 [ 78.775907][ T432] CPU: 1 PID: 432 Comm: kworker/u4:4 Tainted: G W 5.10.0-rc3-syzkaller #0 [ 78.785712][ T432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.795774][ T432] Workqueue: phy14 ieee80211_iface_work [ 78.801312][ T432] Call Trace: [ 78.804597][ T432] dump_stack+0x107/0x163 [ 78.808923][ T432] ? preempt_schedule_thunk+0x16/0x18 [ 78.814295][ T432] ___might_sleep.cold+0x1e8/0x22e [ 78.819403][ T432] sta_info_move_state+0x32/0x8d0 [ 78.824420][ T432] sta_info_free+0x65/0x3b0 [ 78.828917][ T432] sta_info_insert_rcu+0x303/0x2ba0 [ 78.834108][ T432] ? find_held_lock+0x2d/0x110 [ 78.838867][ T432] ? rate_control_rate_init+0x32c/0x6a0 [ 78.844410][ T432] ? sta_info_free+0x3b0/0x3b0 [ 78.849179][ T432] ? __local_bh_enable_ip+0x9c/0x110 [ 78.854467][ T432] ? rate_control_rate_init+0x35f/0x6a0 [ 78.860029][ T432] ieee80211_ibss_finish_sta+0x212/0x390 [ 78.865663][ T432] ? ieee80211_ibss_build_presp+0x15f0/0x15f0 [ 78.871730][ T432] ? __local_bh_enable_ip+0x9c/0x110 [ 78.877015][ T432] ieee80211_ibss_work+0x2c7/0xe80 [ 78.882129][ T432] ? ieee80211_ibss_rx_queued_mgmt+0x1870/0x1870 [ 78.888458][ T432] ? mark_held_locks+0x9f/0xe0 [ 78.893224][ T432] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 78.899039][ T432] ? lockdep_hardirqs_on+0x79/0x100 [ 78.904240][ T432] ? _raw_spin_unlock_irqrestore+0x2f/0x50 [ 78.910054][ T432] ieee80211_iface_work+0x91f/0xa90 [ 78.915251][ T432] process_one_work+0x933/0x15a0 [ 78.920193][ T432] ? lock_release+0x710/0x710 [ 78.924861][ T432] ? pwq_dec_nr_in_flight+0x320/0x320 [ 78.930229][ T432] ? rwlock_bug.part.0+0x90/0x90 [ 78.935161][ T432] ? _raw_spin_lock_irq+0x41/0x50 [ 78.940181][ T432] worker_thread+0x64c/0x1120 [ 78.944859][ T432] ? __kthread_parkme+0x13f/0x1e0 [ 78.949882][ T432] ? process_one_work+0x15a0/0x15a0 [ 78.955073][ T432] kthread+0x3af/0x4a0 [ 78.959137][ T432] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 78.965051][ T432] ret_from_fork+0x1f/0x30 23:17:51 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00'}) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r0, r1, 0xa}, 0x10) r3 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x70, 0x40, 0x1, 0x81, 0x0, 0xae, 0x28411, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x3ff, 0x5}, 0x440, 0xffff, 0xdea, 0x6, 0x33, 0x0, 0x3}, r3, 0x2, 0xffffffffffffffff, 0x2) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r2}, 0x8) recvmsg$kcm(r4, &(0x7f0000001680)={&(0x7f0000000200)=@isdn, 0x80, &(0x7f0000001500)=[{&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x5, &(0x7f0000001580)=""/217, 0xd9}, 0x40000020) recvmsg$kcm(r4, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000016c0)}, {&(0x7f0000001700)=""/144, 0x90}, {&(0x7f00000017c0)=""/218, 0xda}], 0x3, &(0x7f0000001900)}, 0x10102) r5 = openat$cgroup_ro(r4, &(0x7f0000001980)='freezer.self_freezing\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x2, &(0x7f0000001a00)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r4}], &(0x7f0000001a40)='syzkaller\x00', 0x7fff, 0x32, &(0x7f0000001a80)=""/50, 0x40f00, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0x1, 0x7f, 0xff}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000001bc0)={r7, r8}) recvmsg(r6, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/50, 0x32}, {&(0x7f0000002c40)=""/189, 0xbd}], 0x3, &(0x7f0000002d40)}, 0x40000002) r9 = openat$cgroup_ro(r1, &(0x7f0000002dc0)='devices.list\x00', 0x0, 0x0) r10 = gettid() write$cgroup_pid(r9, &(0x7f0000002e00)=r10, 0x12) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000002e40)='syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r11, &(0x7f0000002e80)='devices.allow\x00', 0x2, 0x0) 23:17:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000940)=""/61) 23:17:51 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x1f) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb}, 0x78) 23:17:51 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000009f80)={&(0x7f0000008ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f00)=[{&(0x7f0000008b40)=""/215, 0xd7}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/145, 0x91}, {&(0x7f0000009d00)=""/66, 0x42}, {&(0x7f0000009d80)=""/71, 0x47}, {&(0x7f0000009e00)=""/253, 0xfd}], 0x6}, 0x10002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], r6, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) 23:17:51 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) r1 = openat$cgroup_ro(r0, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000640)={'vlan0\x00', @remote}) r2 = openat$cgroup_ro(r1, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x40) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:51 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000600)='GPL\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={r3, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) 23:17:51 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={r3, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) 23:17:51 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) r1 = openat$cgroup_ro(r0, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000640)={'vlan0\x00', @remote}) openat$cgroup_ro(r1, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000940)=""/61) 23:17:51 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) r1 = openat$cgroup_ro(r0, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000640)={'vlan0\x00', @remote}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:51 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='cq_free\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb}, 0x78) 23:17:51 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={r3, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) 23:17:52 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00'}) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r0, r1, 0xa}, 0x10) r3 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x70, 0x40, 0x1, 0x81, 0x0, 0xae, 0x28411, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x3ff, 0x5}, 0x440, 0xffff, 0xdea, 0x6, 0x33, 0x0, 0x3}, r3, 0x2, 0xffffffffffffffff, 0x2) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r2}, 0x8) recvmsg$kcm(r4, &(0x7f0000001680)={&(0x7f0000000200)=@isdn, 0x80, &(0x7f0000001500)=[{&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x5, &(0x7f0000001580)=""/217, 0xd9}, 0x40000020) recvmsg$kcm(r4, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000016c0)}, {&(0x7f0000001700)=""/144, 0x90}, {&(0x7f00000017c0)=""/218, 0xda}], 0x3, &(0x7f0000001900)}, 0x10102) r5 = openat$cgroup_ro(r4, &(0x7f0000001980)='freezer.self_freezing\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x2, &(0x7f0000001a00)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r4}], &(0x7f0000001a40)='syzkaller\x00', 0x7fff, 0x32, &(0x7f0000001a80)=""/50, 0x40f00, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0x1, 0x7f, 0xff}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000001bc0)={r7, r8}) recvmsg(r6, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/50, 0x32}, {&(0x7f0000002c40)=""/189, 0xbd}], 0x3, &(0x7f0000002d40)}, 0x40000002) r9 = openat$cgroup_ro(r1, &(0x7f0000002dc0)='devices.list\x00', 0x0, 0x0) r10 = gettid() write$cgroup_pid(r9, &(0x7f0000002e00)=r10, 0x12) openat$cgroup(0xffffffffffffffff, &(0x7f0000002e40)='syz1\x00', 0x200002, 0x0) 23:17:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000940)=""/61) 23:17:52 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], 0x0, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) sendmsg(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f000000a0c0)=@ll={0x11, 0x9, 0x0, 0x1, 0x80, 0x6, @remote}, 0x80, &(0x7f000000a140), 0x0, &(0x7f000000a180)=[{0xe0, 0x10c, 0x1, "e2c47264d7d2a2b408fb8dc461bc632624ca141673fe0eeb41d27bc300c909a396040ef75e6d052761158df288efdf5c6987cac79d2c32e81858fc5ef7c518957531c911a9a99e88b899e7cf80de5340e519a0dbb29b045ab214a22635bf45344b4a9a9b56962dc2133d6e9a991c950e1a67bfe0e03eae026209ce90e068149392e52a30ff81a06f2bad6ceb55bdd446b6d4741c08ebaf7ae1ecde48b7236eb290b4018cd88c84807e94bd2cd96fea6e51c08dd5b8fb50c48e26cd97eb258c164894c5c847b02da9d81d7d0816"}, {0x88, 0x10d, 0x8, "d415b795992660cdaf4b8161b2a27dfe7f218fb5b95e56c179e6cc9f6bdfb5dc5ac0606452805b14896d315fc432865069a9a6eb413dd345ac8bb96b06d89f67ad60178f05729dda770cc7727ba9f9aad4fba4a3e3d45fdf2e85217cc7c1de933aef7743612fff22efb806a58619b302b6"}], 0x168}, 0x40) 23:17:52 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="6018e6847e4e8ef9b6b6c34ef659469d960b24f5d6d47de3d57730da155666409a4c0b26055abe4bf34be86d27d4b97b1b74b611c1bf499b62751c461cefedf2b37239a90eca28c9e6479c53ad05ecc0250a9b83532f3c6225dd0e99316f4a1e0b65e54f7058751c7bf870c558ea61cf8336c99c4ee5e3f83580a06e001f91a6df6151fdc35ef478125e76135fcf434f2800ab99c9c778094a3f4ecdb98f4d115976383a7637de9c80f426427526ba8dee2ae15f6b43b8712011ecf86378274d93ac3402d2f16dc69bfaf7c815181292bb59ae6a0a4f8631a7877ccffb749c342fb646911a0350258f25dc6972948dc63f776ecbbf90d1464103cc4369", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) openat$cgroup_ro(r0, &(0x7f0000000600)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:52 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={0xffffffffffffffff, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) 23:17:52 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map, r2, 0x1f, 0x4}, 0x14) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb}, 0x78) 23:17:52 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000005c0)=0x81) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:52 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, 0xffffffffffffffff, 0x14}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={0xffffffffffffffff, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) 23:17:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000940)=""/61) 23:17:52 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x3, &(0x7f0000000100)=@raw=[@map, @alu={0x7, 0x1, 0xa, 0x4, 0x8, 0xffffffffffffffe0, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0xe565, 0xec, &(0x7f0000000180)=""/236, 0x41000, 0xc, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x3dd1, 0x7}, 0x10}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb}, 0x78) 23:17:52 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], 0x0, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) sendmsg(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f000000a0c0)=@ll={0x11, 0x9, 0x0, 0x1, 0x80, 0x6, @remote}, 0x80, &(0x7f000000a140), 0x0, &(0x7f000000a180)=[{0xe0, 0x10c, 0x1, "e2c47264d7d2a2b408fb8dc461bc632624ca141673fe0eeb41d27bc300c909a396040ef75e6d052761158df288efdf5c6987cac79d2c32e81858fc5ef7c518957531c911a9a99e88b899e7cf80de5340e519a0dbb29b045ab214a22635bf45344b4a9a9b56962dc2133d6e9a991c950e1a67bfe0e03eae026209ce90e068149392e52a30ff81a06f2bad6ceb55bdd446b6d4741c08ebaf7ae1ecde48b7236eb290b4018cd88c84807e94bd2cd96fea6e51c08dd5b8fb50c48e26cd97eb258c164894c5c847b02da9d81d7d0816"}, {0x88, 0x10d, 0x8, "d415b795992660cdaf4b8161b2a27dfe7f218fb5b95e56c179e6cc9f6bdfb5dc5ac0606452805b14896d315fc432865069a9a6eb413dd345ac8bb96b06d89f67ad60178f05729dda770cc7727ba9f9aad4fba4a3e3d45fdf2e85217cc7c1de933aef7743612fff22efb806a58619b302b6"}], 0x168}, 0x40) 23:17:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000940)=""/61) 23:17:53 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], 0x0, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) sendmsg(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f000000a0c0)=@ll={0x11, 0x9, 0x0, 0x1, 0x80, 0x6, @remote}, 0x80, &(0x7f000000a140), 0x0, &(0x7f000000a180)=[{0xe0, 0x10c, 0x1, "e2c47264d7d2a2b408fb8dc461bc632624ca141673fe0eeb41d27bc300c909a396040ef75e6d052761158df288efdf5c6987cac79d2c32e81858fc5ef7c518957531c911a9a99e88b899e7cf80de5340e519a0dbb29b045ab214a22635bf45344b4a9a9b56962dc2133d6e9a991c950e1a67bfe0e03eae026209ce90e068149392e52a30ff81a06f2bad6ceb55bdd446b6d4741c08ebaf7ae1ecde48b7236eb290b4018cd88c84807e94bd2cd96fea6e51c08dd5b8fb50c48e26cd97eb258c164894c5c847b02da9d81d7d0816"}, {0x88, 0x10d, 0x8, "d415b795992660cdaf4b8161b2a27dfe7f218fb5b95e56c179e6cc9f6bdfb5dc5ac0606452805b14896d315fc432865069a9a6eb413dd345ac8bb96b06d89f67ad60178f05729dda770cc7727ba9f9aad4fba4a3e3d45fdf2e85217cc7c1de933aef7743612fff22efb806a58619b302b6"}], 0x168}, 0x40) 23:17:53 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00'}) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r0, r1, 0xa}, 0x10) r3 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x70, 0x40, 0x1, 0x81, 0x0, 0xae, 0x28411, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x3ff, 0x5}, 0x440, 0xffff, 0xdea, 0x6, 0x33, 0x0, 0x3}, r3, 0x2, 0xffffffffffffffff, 0x2) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r2}, 0x8) recvmsg$kcm(r4, &(0x7f0000001680)={&(0x7f0000000200)=@isdn, 0x80, &(0x7f0000001500)=[{&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x5, &(0x7f0000001580)=""/217, 0xd9}, 0x40000020) recvmsg$kcm(r4, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000016c0)}, {&(0x7f0000001700)=""/144, 0x90}, {&(0x7f00000017c0)=""/218, 0xda}], 0x3, &(0x7f0000001900)}, 0x10102) r5 = openat$cgroup_ro(r4, &(0x7f0000001980)='freezer.self_freezing\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x2, &(0x7f0000001a00)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r4}], &(0x7f0000001a40)='syzkaller\x00', 0x7fff, 0x32, &(0x7f0000001a80)=""/50, 0x40f00, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0x1, 0x7f, 0xff}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000001bc0)={r7, r8}) recvmsg(r6, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/50, 0x32}, {&(0x7f0000002c40)=""/189, 0xbd}], 0x3, &(0x7f0000002d40)}, 0x40000002) r9 = openat$cgroup_ro(r1, &(0x7f0000002dc0)='devices.list\x00', 0x0, 0x0) r10 = gettid() write$cgroup_pid(r9, &(0x7f0000002e00)=r10, 0x12) 23:17:53 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)=0x82, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={0xffffffffffffffff, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) 23:17:53 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:53 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb}, 0x78) 23:17:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000940)=""/61) 23:17:53 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb}, 0x78) 23:17:53 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:53 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x4a9c2d70210adced, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000400)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x7fff, 0x9}, 0x10}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={0xffffffffffffffff, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) 23:17:53 executing program 0: getpid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='file_check_and_advance_wb_err\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb}, 0x78) 23:17:53 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="3dee4aab90b8fdc01c7260671a2242861707e253b42b07bfab7a821c586298d948acf7b7edf9aa0b63065dd284c02594609a8f933413d0ae14d370214139ff42e7d6cf33f8b002584caff0dc7348df39879874b80f6b027ff18f9fde0bc9bbeed0d5e6cd340e02a58b0a169c4ea0c4931f801ffedfe288b890e4a2dd4132e347b05fd2be101601da38b1e0aeff57b26f011ba39b2a65c037eef6f938780042d31b23ce7665a1720af33a586b706e462a5a781c2eedd9d9dbe13cb441a8524729f4f8be69c5a49df924ab0320043be5af61aec88d5812780831ff6b50ca45bc622d069b275b42e9117eecb047a9d3d9df96aa6dee123764933081c3e438b4", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) recvmsg$kcm(r1, &(0x7f0000009f80)={&(0x7f0000008ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f00)=[{&(0x7f0000008b40)=""/215, 0xd7}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/145, 0x91}, {&(0x7f0000009d00)=""/66, 0x42}, {&(0x7f0000009d80)=""/71, 0x47}, {&(0x7f0000009e00)=""/253, 0xfd}], 0x6}, 0x10002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], r5, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) sendmsg(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f000000a0c0)=@ll={0x11, 0x9, r5, 0x1, 0x80, 0x6, @remote}, 0x80, &(0x7f000000a140), 0x0, &(0x7f000000a180)=[{0xe0, 0x10c, 0x1, "e2c47264d7d2a2b408fb8dc461bc632624ca141673fe0eeb41d27bc300c909a396040ef75e6d052761158df288efdf5c6987cac79d2c32e81858fc5ef7c518957531c911a9a99e88b899e7cf80de5340e519a0dbb29b045ab214a22635bf45344b4a9a9b56962dc2133d6e9a991c950e1a67bfe0e03eae026209ce90e068149392e52a30ff81a06f2bad6ceb55bdd446b6d4741c08ebaf7ae1ecde48b7236eb290b4018cd88c84807e94bd2cd96fea6e51c08dd5b8fb50c48e26cd97eb258c164894c5c847b02da9d81d7d0816"}, {0x88, 0x10d, 0x8, "d415b795992660cdaf4b8161b2a27dfe7f218fb5b95e56c179e6cc9f6bdfb5dc5ac0606452805b14896d315fc432865069a9a6eb413dd345ac8bb96b06d89f67ad60178f05729dda770cc7727ba9f9aad4fba4a3e3d45fdf2e85217cc7c1de933aef7743612fff22efb806a58619b302b6"}], 0x168}, 0x40) 23:17:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000940)=""/61) 23:17:53 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:53 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00'}) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r0, r1, 0xa}, 0x10) r3 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x70, 0x40, 0x1, 0x81, 0x0, 0xae, 0x28411, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x3ff, 0x5}, 0x440, 0xffff, 0xdea, 0x6, 0x33, 0x0, 0x3}, r3, 0x2, 0xffffffffffffffff, 0x2) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r2}, 0x8) recvmsg$kcm(r4, &(0x7f0000001680)={&(0x7f0000000200)=@isdn, 0x80, &(0x7f0000001500)=[{&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x5, &(0x7f0000001580)=""/217, 0xd9}, 0x40000020) recvmsg$kcm(r4, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000016c0)}, {&(0x7f0000001700)=""/144, 0x90}, {&(0x7f00000017c0)=""/218, 0xda}], 0x3, &(0x7f0000001900)}, 0x10102) r5 = openat$cgroup_ro(r4, &(0x7f0000001980)='freezer.self_freezing\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x2, &(0x7f0000001a00)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r4}], &(0x7f0000001a40)='syzkaller\x00', 0x7fff, 0x32, &(0x7f0000001a80)=""/50, 0x40f00, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0x1, 0x7f, 0xff}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000001bc0)={r7, r8}) recvmsg(r6, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/50, 0x32}, {&(0x7f0000002c40)=""/189, 0xbd}], 0x3, &(0x7f0000002d40)}, 0x40000002) openat$cgroup_ro(r1, &(0x7f0000002dc0)='devices.list\x00', 0x0, 0x0) gettid() 23:17:53 executing program 0: getpid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb}, 0x78) 23:17:53 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={0xffffffffffffffff, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) 23:17:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000940)=""/61) 23:17:53 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) recvmsg$kcm(r1, &(0x7f0000009f80)={&(0x7f0000008ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f00)=[{&(0x7f0000008b40)=""/215, 0xd7}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/145, 0x91}, {&(0x7f0000009d00)=""/66, 0x42}, {&(0x7f0000009d80)=""/71, 0x47}, {&(0x7f0000009e00)=""/253, 0xfd}], 0x6}, 0x10002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], r5, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) sendmsg(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f000000a0c0)=@ll={0x11, 0x9, r5, 0x1, 0x80, 0x6, @remote}, 0x80, &(0x7f000000a140), 0x0, &(0x7f000000a180)=[{0xe0, 0x10c, 0x1, "e2c47264d7d2a2b408fb8dc461bc632624ca141673fe0eeb41d27bc300c909a396040ef75e6d052761158df288efdf5c6987cac79d2c32e81858fc5ef7c518957531c911a9a99e88b899e7cf80de5340e519a0dbb29b045ab214a22635bf45344b4a9a9b56962dc2133d6e9a991c950e1a67bfe0e03eae026209ce90e068149392e52a30ff81a06f2bad6ceb55bdd446b6d4741c08ebaf7ae1ecde48b7236eb290b4018cd88c84807e94bd2cd96fea6e51c08dd5b8fb50c48e26cd97eb258c164894c5c847b02da9d81d7d0816"}, {0x88, 0x10d, 0x8, "d415b795992660cdaf4b8161b2a27dfe7f218fb5b95e56c179e6cc9f6bdfb5dc5ac0606452805b14896d315fc432865069a9a6eb413dd345ac8bb96b06d89f67ad60178f05729dda770cc7727ba9f9aad4fba4a3e3d45fdf2e85217cc7c1de933aef7743612fff22efb806a58619b302b6"}], 0x168}, 0x40) 23:17:53 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="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", 0xfd}, {&(0x7f0000000400)="5790456e68d3e3ec170bdc6e6800dd56523fb2843f52d6365d27a36adf5f5d679f7a4f445deedcb3ab2d43889ac95f1e165267620ff04421f96736a3f6feb5664897171d8595524241b8f4b92dea88faeb2a59f64422439a73ff2e668acf73697840115a3ab368dad485983e04ec44b00c3840ebffada90fda4c45e3e40094993e2c161f8dfe05ba1e2d732c64467ba8c9786fde603f3d38db85307194f6ebfe792f9239b8e30de2", 0xa8}], 0x2}, 0x8000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:53 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0xffff7fff}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="db06b03d5099bdd14c721fa8a9386ea9e056f0b020d626f7f38bf6465c1622980d8c627bde436373d2fb80971c", 0x2d}], 0x1, &(0x7f0000000180)="8e1e1a4569fc1fa68f6478c3a4af4b52881625bc21fb72f6737d0535c9cd3631d547c4fdbc55cc123dc2e93f653ce752ab3f54ca31b1d7c180ad33012683bf709449a211ddb18e4b799998072e6f9c6ef24fa0a778be9630a9f6f36e43952865c8ef48b6fb7e6f1186f85400f0a1c15414dff64ec2c2e71e17b95057cfea9e1a6f801156950edef3677d681fa4c73d5ebff7", 0x92, 0x4040040}, 0x80) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x10, &(0x7f0000000800)={&(0x7f0000000700)=""/252, 0xfc}}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000940)=""/61) 23:17:54 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x8}, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:54 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000c240)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfff}, [@exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map={0x18, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x3, 0x0, 0x3, 0xa, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0xfff, 0x70, &(0x7f0000000e00)=""/112, 0x41000, 0x12, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f000000c1c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f000000c200)={0x1, 0xc, 0x1ff, 0x100}, 0x10, 0xe7bb}, 0x78) 23:17:54 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000280)=""/9, 0x9}], 0x3}, 0x40010040) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={0xffffffffffffffff, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) 23:17:54 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r1, 0x10, &(0x7f0000000b00)={&(0x7f0000000a80)=""/125, 0x7d}}, 0x10) recvmsg$kcm(r1, &(0x7f0000009f80)={&(0x7f0000008ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f00)=[{&(0x7f0000008b40)=""/215, 0xd7}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/145, 0x91}, {&(0x7f0000009d00)=""/66, 0x42}, {&(0x7f0000009d80)=""/71, 0x47}, {&(0x7f0000009e00)=""/253, 0xfd}], 0x6}, 0x10002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], r5, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) sendmsg(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f000000a0c0)=@ll={0x11, 0x9, r5, 0x1, 0x80, 0x6, @remote}, 0x80, &(0x7f000000a140), 0x0, &(0x7f000000a180)=[{0xe0, 0x10c, 0x1, "e2c47264d7d2a2b408fb8dc461bc632624ca141673fe0eeb41d27bc300c909a396040ef75e6d052761158df288efdf5c6987cac79d2c32e81858fc5ef7c518957531c911a9a99e88b899e7cf80de5340e519a0dbb29b045ab214a22635bf45344b4a9a9b56962dc2133d6e9a991c950e1a67bfe0e03eae026209ce90e068149392e52a30ff81a06f2bad6ceb55bdd446b6d4741c08ebaf7ae1ecde48b7236eb290b4018cd88c84807e94bd2cd96fea6e51c08dd5b8fb50c48e26cd97eb258c164894c5c847b02da9d81d7d0816"}, {0x88, 0x10d, 0x8, "d415b795992660cdaf4b8161b2a27dfe7f218fb5b95e56c179e6cc9f6bdfb5dc5ac0606452805b14896d315fc432865069a9a6eb413dd345ac8bb96b06d89f67ad60178f05729dda770cc7727ba9f9aad4fba4a3e3d45fdf2e85217cc7c1de933aef7743612fff22efb806a58619b302b6"}], 0x168}, 0x40) 23:17:54 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00'}) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r0, r1, 0xa}, 0x10) r3 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x70, 0x40, 0x1, 0x81, 0x0, 0xae, 0x28411, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x3ff, 0x5}, 0x440, 0xffff, 0xdea, 0x6, 0x33, 0x0, 0x3}, r3, 0x2, 0xffffffffffffffff, 0x2) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r2}, 0x8) recvmsg$kcm(r4, &(0x7f0000001680)={&(0x7f0000000200)=@isdn, 0x80, &(0x7f0000001500)=[{&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x5, &(0x7f0000001580)=""/217, 0xd9}, 0x40000020) recvmsg$kcm(r4, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000016c0)}, {&(0x7f0000001700)=""/144, 0x90}, {&(0x7f00000017c0)=""/218, 0xda}], 0x3, &(0x7f0000001900)}, 0x10102) r5 = openat$cgroup_ro(r4, &(0x7f0000001980)='freezer.self_freezing\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x2, &(0x7f0000001a00)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r4}], &(0x7f0000001a40)='syzkaller\x00', 0x7fff, 0x32, &(0x7f0000001a80)=""/50, 0x40f00, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0x1, 0x7f, 0xff}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000001bc0)={r7, r8}) recvmsg(r6, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/50, 0x32}, {&(0x7f0000002c40)=""/189, 0xbd}], 0x3, &(0x7f0000002d40)}, 0x40000002) openat$cgroup_ro(r1, &(0x7f0000002dc0)='devices.list\x00', 0x0, 0x0) 23:17:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000940)=""/61) 23:17:54 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=0x1, r0, 0xb}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={0xffffffffffffffff, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) 23:17:54 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_convert_to_initialized_fastpath\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5e3d) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000140)=""/186) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000900)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)="da02cc4dfaf1566f56da7d6a067604241e756e4d8e4b41f33e5f01e376aa15c8efe0a5fe2cb2b593ef716935fcd5f3817bb334f2daac64a555827f7a83b1", 0x3e}, {&(0x7f0000000300)="581a4c79a64bc059ef71e94af36abb2e14f824bff4c3c01ab6d9c055556f731ae44f5955c438ddedb48e156a878e55a60e64ea213815a9d4de2cf26896b3a661c6da3128cdeb3efd227bbaa793a9dcb4f9529b355c9d84428e2373aaa765c297cc81cf225107d48e046092e5c85e33b5ec23682d037b1600651a7568b948fcc8748e4e5557596823b58a52476fc97d84362ac74e49f46761cd6a0d2e71ee581360dcd12f0654dfbf4f968c83", 0xac}, {&(0x7f00000003c0)="49f9d3ec6ad1473eb54a9206bbcedf8d5e40b881459fde1317d2b3084063596697c9a02cdcc6ffbed8fce6f8971e80c3dd689a5084acdb715fe7eff6dba553351ad4612cfe2a5604b906a3c4d7a2f44bb95cb7ed49245143813c71baebc7499d34e0727c2f87468cd4fbc239329381ab1c99bb5e140f2d79f146e3ff2a6f8f84f87c2911cb512867b717639026a3e144e104635f05bba4cee0", 0x99}, {&(0x7f0000000480)="c5fff03f09a387f4274d524c92d36c367ae036efc4399146dc70e2ec3f1b1d6ec1bf70b24a56db2fb8cd93c12970ea4e1ac2fe999f1780f5a037461b5ae1270b4163cb60457afb0008692eb335a046695f0f14cdb4384a9de985808cf5640ba0f75e15d74007aff942cabcff21283e063c3b35387200b252b72ee207f8c9527935a04549018ce3573495204bbcad7b3a78e4445970ff0ce47efaec96f616151464cba52719e2ff7623ff5a457e590e651d95285ecd96beb72137c78e4e3bc01ac449edb7d285da817e8282db067799c112cd05249f002d6c6e85", 0xda}, {&(0x7f0000000580)="5265c9b036b79f208be74aaa55036bd8f22a59a940387e649e7a55c480e417d8214c5f661a245df715f73d0b6a60f95160851d8be96a9d9723ef009a730eac3b03bcb729e59c6404bd5e503aa030fca318dc72c330328b9699af30f3f1aa8176b78554d6a918a5", 0x67}, {&(0x7f0000000600)="a2", 0x1}, {&(0x7f0000000640)="1bfa86d490a2f40a2d261fac23cef4a72bd6b15beefc08ebc8c606d37ffa8709c31b18d7b5485c21aca4c2d6d24a499f4a0481ba23ce9b6eeb249669df563245e26c133fbb327e9d0dbd90db38af8dfd43014700c2aa4262c9909ac75b2d72624e64602444855224b987f5b42e7c78de1a9514e692412d2e7157a083298969757cd8e0427ce9a4d74cf88a071f205c959aaeba7fd9246b339ded402d09336d44cf994d4afde730f99508badb6bf685c76253c8e906fffd755252c6cb79801b859e1e7be524015a65deb9ae0340625cade235c21a70e4d5869e7d0a9f1f88e1ff", 0xe0}, {&(0x7f0000000740)="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", 0xfe}], 0x8, &(0x7f00000008c0)=[@txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x30}, 0x8000) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r1}, 0x8) write$cgroup_int(r4, &(0x7f0000000980), 0x12) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r1, 0x10, &(0x7f0000000a00)={&(0x7f00000009c0)=""/33, 0x21}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000009f80)={&(0x7f0000008ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f00)=[{&(0x7f0000008b40)=""/215, 0xd7}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/145, 0x91}, {&(0x7f0000009d00)=""/66, 0x42}, {&(0x7f0000009d80)=""/71, 0x47}, {&(0x7f0000009e00)=""/253, 0xfd}], 0x6}, 0x10002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000a040)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x6}, [@exit, @alu={0x4, 0x0, 0x8, 0xb, 0xb, 0x30, 0xffffffffffffffff}, @generic={0x2, 0x3, 0xb, 0x5, 0x80}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000c80)='GPL\x00', 0x4, 0x9e, &(0x7f0000000cc0)=""/158, 0x40f00, 0x1, [], r6, 0x17, r1, 0x8, &(0x7f0000009fc0)={0x7, 0x1}, 0x8, 0x10, &(0x7f000000a000)={0x2, 0x8, 0x3, 0x7}, 0x10, 0x23c73, r0}, 0x78) sendmsg(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f000000a0c0)=@ll={0x11, 0x9, r6, 0x1, 0x80, 0x6, @remote}, 0x80, &(0x7f000000a140), 0x0, &(0x7f000000a180)=[{0xe0, 0x10c, 0x1, "e2c47264d7d2a2b408fb8dc461bc632624ca141673fe0eeb41d27bc300c909a396040ef75e6d052761158df288efdf5c6987cac79d2c32e81858fc5ef7c518957531c911a9a99e88b899e7cf80de5340e519a0dbb29b045ab214a22635bf45344b4a9a9b56962dc2133d6e9a991c950e1a67bfe0e03eae026209ce90e068149392e52a30ff81a06f2bad6ceb55bdd446b6d4741c08ebaf7ae1ecde48b7236eb290b4018cd88c84807e94bd2cd96fea6e51c08dd5b8fb50c48e26cd97eb258c164894c5c847b02da9d81d7d0816"}, {0x88, 0x10d, 0x8, "d415b795992660cdaf4b8161b2a27dfe7f218fb5b95e56c179e6cc9f6bdfb5dc5ac0606452805b14896d315fc432865069a9a6eb413dd345ac8bb96b06d89f67ad60178f05729dda770cc7727ba9f9aad4fba4a3e3d45fdf2e85217cc7c1de933aef7743612fff22efb806a58619b302b6"}], 0x168}, 0x40) 23:17:54 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='[\x00'}, 0x30) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:54 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 23:17:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000940)=""/61) 23:17:54 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:54 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={0xffffffffffffffff, 0xe, 0x0, 0x9, &(0x7f0000000840)=[0x0, 0x0], 0x2}, 0x20) 23:17:54 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 23:17:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x8, 0x5, 0xb00, 0x1, 0x9, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='xprtrdma_op_connect\x00', r1}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r1, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)={[{0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}]}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x200, 0x1, 0x1109, 0x1, 0x81, [], 0x0, r1, 0x1, 0x2, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000240)="624494673b195c3bb0dba3e34c397b4387113c7cc7c0a9ded15b9a03e17806006fa7448ea874377af7ae30a90859643456b21d46be5a08da2ce0de1c3a6d8a7be84e4780d296d37d238446534dab5b3de80085f66e22312ab6df81d95d6164d8ff304cd0521d914e4fb8decf47773554e64ab3716effe4d09c", &(0x7f00000002c0)=""/243}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r1}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000440)={'veth0\x00'}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) write$cgroup_int(r1, &(0x7f00000004c0)=0x4e88, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1fab}}, @volatile={0x7}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5a, 0x0, 0x53, 0x4}, @func={0x4, 0x0, 0x0, 0xc, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x7d}, @volatile={0x10}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/251, 0x83, 0xfb, 0x1}, 0x20) openat$cgroup_procs(r1, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r0, 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000900)={r1}, 0x8) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000940)=""/61) 23:17:54 executing program 4: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00', 0x0, 0x14}, 0x10) 23:17:55 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00'}) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r0, r1, 0xa}, 0x10) r3 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x70, 0x40, 0x1, 0x81, 0x0, 0xae, 0x28411, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x3ff, 0x5}, 0x440, 0xffff, 0xdea, 0x6, 0x33, 0x0, 0x3}, r3, 0x2, 0xffffffffffffffff, 0x2) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r2}, 0x8) recvmsg$kcm(r4, &(0x7f0000001680)={&(0x7f0000000200)=@isdn, 0x80, &(0x7f0000001500)=[{&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x5, &(0x7f0000001580)=""/217, 0xd9}, 0x40000020) recvmsg$kcm(r4, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000016c0)}, {&(0x7f0000001700)=""/144, 0x90}, {&(0x7f00000017c0)=""/218, 0xda}], 0x3, &(0x7f0000001900)}, 0x10102) r5 = openat$cgroup_ro(r4, &(0x7f0000001980)='freezer.self_freezing\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x2, &(0x7f0000001a00)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r4}], &(0x7f0000001a40)='syzkaller\x00', 0x7fff, 0x32, &(0x7f0000001a80)=""/50, 0x40f00, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0x1, 0x7f, 0xff}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000001bc0)={r7, r8}) recvmsg(r6, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/50, 0x32}, {&(0x7f0000002c40)=""/189, 0xbd}], 0x3, &(0x7f0000002d40)}, 0x40000002) 23:17:55 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ext4_ext_conve