x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b80)={r1}) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) ioctl$TUNATTACHFILTER(r10, 0x401054d5, &(0x7f0000000040)={0x9, &(0x7f00000000c0)=[{0x6, 0x9, 0x4, 0x240}, {0x6, 0x5, 0x2a, 0x1}, {0x1ff, 0xf9, 0x40, 0x20}, {0xfff, 0x80, 0x9, 0x401}, {0xf693, 0x0, 0x3, 0x8}, {0x681, 0x82, 0x5, 0x5}, {0xffc, 0x20, 0xf7, 0x8}, {0xa4e8, 0x7, 0xfd, 0x9}, {0x3, 0x0, 0xf5, 0x4}]}) 23:43:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 23:43:04 executing program 4: socketpair(0x18, 0x2, 0x0, &(0x7f0000000040)) 23:43:04 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b80)={r1}) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) ioctl$TUNATTACHFILTER(r10, 0x401054d5, &(0x7f0000000040)={0x9, &(0x7f00000000c0)=[{0x6, 0x9, 0x4, 0x240}, {0x6, 0x5, 0x2a, 0x1}, {0x1ff, 0xf9, 0x40, 0x20}, {0xfff, 0x80, 0x9, 0x401}, {0xf693, 0x0, 0x3, 0x8}, {0x681, 0x82, 0x5, 0x5}, {0xffc, 0x20, 0xf7, 0x8}, {0xa4e8, 0x7, 0xfd, 0x9}, {0x3, 0x0, 0xf5, 0x4}]}) 23:43:04 executing program 4: socketpair(0x18, 0x2, 0x0, &(0x7f0000000040)) 23:43:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 23:43:04 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/9, 0x9}, {&(0x7f0000000440)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:04 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/140, 0x8c}, {&(0x7f0000000100)=""/176, 0xb0}, {&(0x7f00000001c0)=""/250, 0xfa}], 0x3, &(0x7f0000000300)=""/6, 0x6}, 0x40012101) (async) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/140, 0x8c}, {&(0x7f0000000100)=""/176, 0xb0}, {&(0x7f00000001c0)=""/250, 0xfa}], 0x3, &(0x7f0000000300)=""/6, 0x6}, 0x40012101) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='tasks\x00', 0x2, 0x0) 23:43:04 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:04 executing program 4: socketpair(0x18, 0x2, 0x0, &(0x7f0000000040)) 23:43:04 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b80)={r1}) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) ioctl$TUNATTACHFILTER(r10, 0x401054d5, &(0x7f0000000040)={0x9, &(0x7f00000000c0)=[{0x6, 0x9, 0x4, 0x240}, {0x6, 0x5, 0x2a, 0x1}, {0x1ff, 0xf9, 0x40, 0x20}, {0xfff, 0x80, 0x9, 0x401}, {0xf693, 0x0, 0x3, 0x8}, {0x681, 0x82, 0x5, 0x5}, {0xffc, 0x20, 0xf7, 0x8}, {0xa4e8, 0x7, 0xfd, 0x9}, {0x3, 0x0, 0xf5, 0x4}]}) 23:43:04 executing program 4: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)) 23:43:04 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b80)={r1}) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:04 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) (async) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/140, 0x8c}, {&(0x7f0000000100)=""/176, 0xb0}, {&(0x7f00000001c0)=""/250, 0xfa}], 0x3, &(0x7f0000000300)=""/6, 0x6}, 0x40012101) (async) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='tasks\x00', 0x2, 0x0) 23:43:04 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 23:43:04 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b80)={r1}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:05 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:05 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:05 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 23:43:05 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/9, 0x9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:05 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:05 executing program 4: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)) 23:43:05 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 23:43:05 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) 23:43:05 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) (async) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) (async) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) (async) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) (async) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:05 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 23:43:05 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) 23:43:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 23:43:05 executing program 4: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)) 23:43:05 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:06 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/9, 0x9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 23:43:06 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:06 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) 23:43:06 executing program 4: socketpair(0x18, 0x0, 0x0, &(0x7f0000000040)) 23:43:06 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) (async) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) (async) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) (async) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) (async) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) (async) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 23:43:06 executing program 4: socketpair(0x18, 0x0, 0x0, 0x0) 23:43:06 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:06 executing program 0: socketpair(0x1, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8}, 0x48) 23:43:06 executing program 4: socketpair(0x18, 0x0, 0x0, 0x0) 23:43:07 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/9, 0x9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:07 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:07 executing program 0: socketpair(0x1, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:07 executing program 1: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)) 23:43:07 executing program 4: socketpair(0x18, 0x0, 0x0, 0x0) 23:43:07 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000180)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x1, 0x3}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000080)="14c86c03e7f7299f8bad2806b34b92db68d5370f52e3c28fe4c62c4ae401ee66954f037ceb3e7c3c37128d", 0x2b}], 0x1, &(0x7f0000000100)="90694761cd0f89d8afe1bf214d2750e6908b74b727fe43d9d95ed3357275827ef6bda12e9cbe10f9204a8d90521c169a466d1b6f228608f8487b0c05c37e2cb70fe252421c350d50411fd068b14b3ab2f0133f3cddbf89fd16e4defef8ce75d30a475a", 0x63, 0x800}, 0x4008000) 23:43:07 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:07 executing program 4: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:07 executing program 0: socketpair(0x1, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:07 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:07 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000180)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x1, 0x3}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000080)="14c86c03e7f7299f8bad2806b34b92db68d5370f52e3c28fe4c62c4ae401ee66954f037ceb3e7c3c37128d", 0x2b}], 0x1, &(0x7f0000000100)="90694761cd0f89d8afe1bf214d2750e6908b74b727fe43d9d95ed3357275827ef6bda12e9cbe10f9204a8d90521c169a466d1b6f228608f8487b0c05c37e2cb70fe252421c350d50411fd068b14b3ab2f0133f3cddbf89fd16e4defef8ce75d30a475a", 0x63, 0x800}, 0x4008000) 23:43:07 executing program 4: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:08 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/9, 0x9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:08 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:08 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="762f49d3d6a5b0e38a0ef518400000fcffffff00000000000000003d850200fcffffff85200000020000000600000000"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)={r0}) 23:43:08 executing program 4: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:08 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000180)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x1, 0x3}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000080)="14c86c03e7f7299f8bad2806b34b92db68d5370f52e3c28fe4c62c4ae401ee66954f037ceb3e7c3c37128d", 0x2b}], 0x1, &(0x7f0000000100)="90694761cd0f89d8afe1bf214d2750e6908b74b727fe43d9d95ed3357275827ef6bda12e9cbe10f9204a8d90521c169a466d1b6f228608f8487b0c05c37e2cb70fe252421c350d50411fd068b14b3ab2f0133f3cddbf89fd16e4defef8ce75d30a475a", 0x63, 0x800}, 0x4008000) 23:43:08 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:08 executing program 2: socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) 23:43:08 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x7, 0x10}, 0xc) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r0}, 0x8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x268b4fb70c8a0cc5, 0x4f, 0xfff, 0x7, 0x442, r1, 0xfffffffc, '\x00', 0x0, r0, 0x4, 0x0, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, r7, r8, r1, r9], 0x0, 0x10, 0x5}, 0x45) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={0x0}, 0x9) 23:43:08 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="762f49d3d6a5b0e38a0ef518400000fcffffff00000000000000003d850200fcffffff85200000020000000600000000"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)={r0}) socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) sendmsg$tipc(r2, 0x0, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="762f49d3d6a5b0e38a0ef518400000fcffffff00000000000000003d850200fcffffff85200000020000000600000000"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) (async) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)={r0}) (async) 23:43:08 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:08 executing program 2: socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) (async) 23:43:09 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x7, 0x10}, 0xc) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r0}, 0x8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x268b4fb70c8a0cc5, 0x4f, 0xfff, 0x7, 0x442, r1, 0xfffffffc, '\x00', 0x0, r0, 0x4, 0x0, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, r7, r8, r1, r9], 0x0, 0x10, 0x5}, 0x45) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={0x0}, 0x9) 23:43:09 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="762f49d3d6a5b0e38a0ef518400000fcffffff00000000000000003d850200fcffffff85200000020000000600000000"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)={r0}) socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) sendmsg$tipc(r2, 0x0, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="762f49d3d6a5b0e38a0ef518400000fcffffff00000000000000003d850200fcffffff85200000020000000600000000"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) (async) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)={r0}) (async) 23:43:09 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:09 executing program 2: socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) 23:43:09 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x7, 0x10}, 0xc) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r0}, 0x8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x268b4fb70c8a0cc5, 0x4f, 0xfff, 0x7, 0x442, r1, 0xfffffffc, '\x00', 0x0, r0, 0x4, 0x0, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, r7, r8, r1, r9], 0x0, 0x10, 0x5}, 0x45) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={0x0}, 0x9) 23:43:09 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:09 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x200}, 0x8) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000340)=""/100, 0x2e}, {&(0x7f0000000180)=""/135, 0x87}, {&(0x7f00000003c0)=""/193}], 0x2, &(0x7f0000000280)}, 0x1) 23:43:09 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) 23:43:09 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x7, 0x10}, 0xc) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r0}, 0x8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x268b4fb70c8a0cc5, 0x4f, 0xfff, 0x7, 0x442, r1, 0xfffffffc, '\x00', 0x0, r0, 0x4, 0x0, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, r7, r8, r1, r9], 0x0, 0x10, 0x5}, 0x45) 23:43:10 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:10 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:10 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x200}, 0x8) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000340)=""/100, 0x2e}, {&(0x7f0000000180)=""/135, 0x87}, {&(0x7f00000003c0)=""/193}], 0x2, &(0x7f0000000280)}, 0x1) (async) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000340)=""/100, 0x2e}, {&(0x7f0000000180)=""/135, 0x87}, {&(0x7f00000003c0)=""/193}], 0x2, &(0x7f0000000280)}, 0x1) 23:43:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x7, 0x10}, 0xc) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, r7, r8, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:10 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x9, 0x8}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) (async) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) 23:43:10 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:43:10 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:10 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) (async, rerun: 32) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x9, 0x8}, 0xc) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) 23:43:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x7, 0x10}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, r7, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:10 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x200}, 0x8) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000340)=""/100, 0x2e}, {&(0x7f0000000180)=""/135, 0x87}, {&(0x7f00000003c0)=""/193}], 0x2, &(0x7f0000000280)}, 0x1) 23:43:10 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:10 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000b80)={r1}) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)=0x1) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000040)={r6}) 23:43:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:11 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:11 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000180)="7c4bda5c4be0932c4b87309dc4600abeeecc8bec62f374d3cd02d20e20fba08e933061a53448084f502642b79e43598b7e1e5c16", &(0x7f0000000280)=""/170}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, 0x1], 0x0, 0x10, 0x6}, 0x90) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r6}, 0x18) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b40)={r9}) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x89e2, &(0x7f0000000b80)={r9}) ioctl$TUNGETVNETBE(r9, 0x800454df, &(0x7f0000001100)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x6, 0xfff, 0xb45, 0x40, r7, 0x4, '\x00', 0x0, r9, 0x1, 0x0, 0x1, 0x4}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1, r6}) 23:43:11 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000b80)={r1}) (async) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)=0x1) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000040)={r6}) 23:43:11 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:11 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:43:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:11 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:11 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000b80)={r1}) (async) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)=0x1) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000040)={r6}) 23:43:11 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000180)="7c4bda5c4be0932c4b87309dc4600abeeecc8bec62f374d3cd02d20e20fba08e933061a53448084f502642b79e43598b7e1e5c16", &(0x7f0000000280)=""/170}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, 0x1], 0x0, 0x10, 0x6}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, 0x1], 0x0, 0x10, 0x6}, 0x90) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r6}, 0x18) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r6}, 0x18) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) (async) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b40)={r9}) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x89e2, &(0x7f0000000b80)={r9}) ioctl$TUNGETVNETBE(r9, 0x800454df, &(0x7f0000001100)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x6, 0xfff, 0xb45, 0x40, r7, 0x4, '\x00', 0x0, r9, 0x1, 0x0, 0x1, 0x4}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1, r6}) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1, r6}) 23:43:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:11 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:11 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x8, 0x0, 0x7f, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x7f, 0x76f}, 0x80405, 0x9, 0x930, 0x9, 0x4, 0x7fffffff, 0x5, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) 23:43:12 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:12 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x8, 0x0, 0x7f, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x7f, 0x76f}, 0x80405, 0x9, 0x930, 0x9, 0x4, 0x7fffffff, 0x5, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) 23:43:12 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:12 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:43:12 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:12 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000180)="7c4bda5c4be0932c4b87309dc4600abeeecc8bec62f374d3cd02d20e20fba08e933061a53448084f502642b79e43598b7e1e5c16", &(0x7f0000000280)=""/170}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, 0x1], 0x0, 0x10, 0x6}, 0x90) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r6}, 0x18) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) (async) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async, rerun: 32) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b40)={r9}) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x89e2, &(0x7f0000000b80)={r9}) ioctl$TUNGETVNETBE(r9, 0x800454df, &(0x7f0000001100)) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x6, 0xfff, 0xb45, 0x40, r7, 0x4, '\x00', 0x0, r9, 0x1, 0x0, 0x1, 0x4}, 0x48) (async, rerun: 32) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1, r6}) 23:43:12 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x8, 0x0, 0x7f, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x7f, 0x76f}, 0x80405, 0x9, 0x930, 0x9, 0x4, 0x7fffffff, 0x5, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x8, 0x0, 0x7f, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x7f, 0x76f}, 0x80405, 0x9, 0x930, 0x9, 0x4, 0x7fffffff, 0x5, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) (async) 23:43:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:12 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000040)="bcbcf4926af0cab633488a3c8c331a17e806471955c1911e07f3c9e89534e0967fd9b8285e0c799ea3f25d360c0900f2875d0dbef1a102396b9db7485e6c7a0f756d18901ef4420b54109ee0723d2745710e2867083ed21c046d2255b90c4aaafd15b9791800983aa8fc4ff3233606", &(0x7f00000000c0)=""/172, &(0x7f0000000340)="33d4d57f6f0d8f0f14c4300e3e082206f29f896f6243d39e87fe0798ed70f235376711c92676cb37fecb8dfec430267db381969997cc4ac7f3029555cfb10cd39d147b6b9c10c227b6cb8ce0257f996d025cfecb8ce229e40540ab776167bd5115cb3dff89edd66d04d5309ec128138467732a83851dbfd9cc3ef2296c86f3d4539ffcf34ee6715240e8028622d2257730821b2974fde1df904f437447df4d8f0a35c15043c33afb07809742ddc74a8eb554b658288192281e70c610c76e0a92e3bb527bf1fa4da4a7a0416738aa80c62d6096281d4b82271ce031df178806830b80c1310dd375919d6d4a499e006cb8cb2431eb224c26", &(0x7f0000000280)="d436ea3bd785302ba000f6cf2bb6c6c03ec4f3a1479bca7e509b73ec1fd80b8ade78894acd39910a8f29b111b00859fe4f3d5fb751e5870cf2df3f06cccb7efbad5c9931023f6298f7a4b3fedbf75cd219105bc4808d2f6e81ce893ede039e6ff13da69e1f9ea6c6", 0x6, 0x1}, 0x38) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x4000, r0}, 0x18) 23:43:12 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:13 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:13 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000740)) socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000080)=""/213, 0xd5}, {&(0x7f0000000200)=""/133, 0x85}, {&(0x7f0000000180)=""/42, 0x2a}, {&(0x7f00000002c0)=""/172, 0xac}, {&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/230, 0xe6}], 0x6, &(0x7f0000000580)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x150}, 0x10001) 23:43:13 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r2 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:13 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:13 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000040)="bcbcf4926af0cab633488a3c8c331a17e806471955c1911e07f3c9e89534e0967fd9b8285e0c799ea3f25d360c0900f2875d0dbef1a102396b9db7485e6c7a0f756d18901ef4420b54109ee0723d2745710e2867083ed21c046d2255b90c4aaafd15b9791800983aa8fc4ff3233606", &(0x7f00000000c0)=""/172, &(0x7f0000000340)="33d4d57f6f0d8f0f14c4300e3e082206f29f896f6243d39e87fe0798ed70f235376711c92676cb37fecb8dfec430267db381969997cc4ac7f3029555cfb10cd39d147b6b9c10c227b6cb8ce0257f996d025cfecb8ce229e40540ab776167bd5115cb3dff89edd66d04d5309ec128138467732a83851dbfd9cc3ef2296c86f3d4539ffcf34ee6715240e8028622d2257730821b2974fde1df904f437447df4d8f0a35c15043c33afb07809742ddc74a8eb554b658288192281e70c610c76e0a92e3bb527bf1fa4da4a7a0416738aa80c62d6096281d4b82271ce031df178806830b80c1310dd375919d6d4a499e006cb8cb2431eb224c26", &(0x7f0000000280)="d436ea3bd785302ba000f6cf2bb6c6c03ec4f3a1479bca7e509b73ec1fd80b8ade78894acd39910a8f29b111b00859fe4f3d5fb751e5870cf2df3f06cccb7efbad5c9931023f6298f7a4b3fedbf75cd219105bc4808d2f6e81ce893ede039e6ff13da69e1f9ea6c6", 0x6, 0x1}, 0x38) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x4000, r0}, 0x18) 23:43:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:13 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:13 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000740)) (async, rerun: 32) socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000080)=""/213, 0xd5}, {&(0x7f0000000200)=""/133, 0x85}, {&(0x7f0000000180)=""/42, 0x2a}, {&(0x7f00000002c0)=""/172, 0xac}, {&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/230, 0xe6}], 0x6, &(0x7f0000000580)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x150}, 0x10001) 23:43:13 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000040)="bcbcf4926af0cab633488a3c8c331a17e806471955c1911e07f3c9e89534e0967fd9b8285e0c799ea3f25d360c0900f2875d0dbef1a102396b9db7485e6c7a0f756d18901ef4420b54109ee0723d2745710e2867083ed21c046d2255b90c4aaafd15b9791800983aa8fc4ff3233606", &(0x7f00000000c0)=""/172, &(0x7f0000000340)="33d4d57f6f0d8f0f14c4300e3e082206f29f896f6243d39e87fe0798ed70f235376711c92676cb37fecb8dfec430267db381969997cc4ac7f3029555cfb10cd39d147b6b9c10c227b6cb8ce0257f996d025cfecb8ce229e40540ab776167bd5115cb3dff89edd66d04d5309ec128138467732a83851dbfd9cc3ef2296c86f3d4539ffcf34ee6715240e8028622d2257730821b2974fde1df904f437447df4d8f0a35c15043c33afb07809742ddc74a8eb554b658288192281e70c610c76e0a92e3bb527bf1fa4da4a7a0416738aa80c62d6096281d4b82271ce031df178806830b80c1310dd375919d6d4a499e006cb8cb2431eb224c26", &(0x7f0000000280)="d436ea3bd785302ba000f6cf2bb6c6c03ec4f3a1479bca7e509b73ec1fd80b8ade78894acd39910a8f29b111b00859fe4f3d5fb751e5870cf2df3f06cccb7efbad5c9931023f6298f7a4b3fedbf75cd219105bc4808d2f6e81ce893ede039e6ff13da69e1f9ea6c6", 0x6, 0x1}, 0x38) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x4000, r0}, 0x18) 23:43:13 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:14 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:14 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x18) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000300)=""/20, 0x14}], 0x2, &(0x7f0000000380)=""/1, 0x1}, 0x40000040) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="18400000fcffffff4a900902d0ae55aa65fe02008240374a5647ab789a8376000000000000003d85000006201f00"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)=@o_path={&(0x7f00000001c0)='./file0\x00', r2, 0x4000, r6}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000100)}, 0x10) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r8, 0x0, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r8}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r9, r8, r7, r10, r8, 0xffffffffffffffff, r8, r8], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r7, r10], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b40)={r8}) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x89e2, &(0x7f0000000b80)={r8}) ioctl$TUNGETVNETBE(r8, 0x800454df, &(0x7f0000001100)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x4, r8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xec) 23:43:14 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:14 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:14 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x414102, 0x0) 23:43:14 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x18) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000300)=""/20, 0x14}], 0x2, &(0x7f0000000380)=""/1, 0x1}, 0x40000040) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="18400000fcffffff4a900902d0ae55aa65fe02008240374a5647ab789a8376000000000000003d85000006201f00"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="18400000fcffffff4a900902d0ae55aa65fe02008240374a5647ab789a8376000000000000003d85000006201f00"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)=@o_path={&(0x7f00000001c0)='./file0\x00', r2, 0x4000, r6}, 0x18) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)=@o_path={&(0x7f00000001c0)='./file0\x00', r2, 0x4000, r6}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000100)}, 0x10) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r8, 0x0, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r8}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r9, r8, r7, r10, r8, 0xffffffffffffffff, r8, r8], 0x0, 0x10, 0x6}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r9, r8, r7, r10, r8, 0xffffffffffffffff, r8, r8], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r7, r10], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b40)={r8}) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x89e2, &(0x7f0000000b80)={r8}) ioctl$TUNGETVNETBE(r8, 0x800454df, &(0x7f0000001100)) (async) ioctl$TUNGETVNETBE(r8, 0x800454df, &(0x7f0000001100)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x4, r8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xec) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xec) 23:43:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:14 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000740)) (async, rerun: 64) socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000080)=""/213, 0xd5}, {&(0x7f0000000200)=""/133, 0x85}, {&(0x7f0000000180)=""/42, 0x2a}, {&(0x7f00000002c0)=""/172, 0xac}, {&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/230, 0xe6}], 0x6, &(0x7f0000000580)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x150}, 0x10001) 23:43:14 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x18) (async) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000300)=""/20, 0x14}], 0x2, &(0x7f0000000380)=""/1, 0x1}, 0x40000040) (async, rerun: 32) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) (async, rerun: 32) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (rerun: 32) sendmsg$tipc(r2, 0x0, 0x0) (async) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async, rerun: 64) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="18400000fcffffff4a900902d0ae55aa65fe02008240374a5647ab789a8376000000000000003d85000006201f00"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async, rerun: 64) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)=@o_path={&(0x7f00000001c0)='./file0\x00', r2, 0x4000, r6}, 0x18) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000100)}, 0x10) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) (async, rerun: 32) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (rerun: 32) sendmsg$tipc(r8, 0x0, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async, rerun: 32) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r8}, 0x18) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r9, r8, r7, r10, r8, 0xffffffffffffffff, r8, r8], 0x0, 0x10, 0x6}, 0x90) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r7, r10], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (rerun: 32) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b40)={r8}) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x89e2, &(0x7f0000000b80)={r8}) (async) ioctl$TUNGETVNETBE(r8, 0x800454df, &(0x7f0000001100)) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x4, r8}, 0x10) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xec) 23:43:14 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x414102, 0x0) 23:43:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:15 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:15 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x414102, 0x0) 23:43:15 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:15 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000300)=""/250, 0xfa}, {&(0x7f0000000400)=""/40, 0x28}], 0x6, &(0x7f00000004c0)=""/207, 0xcf}, 0x10) 23:43:15 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:15 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 23:43:15 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 23:43:15 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) r2 = gettid() r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r3}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r3, r3, r5, r4, r3, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="6f0c8cbce8e468a7c100d99c34567e950000200000000085100000fdffffff"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r3, r6], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000b40)={r4}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r4}) ioctl$TUNGETVNETBE(r4, 0x800454df, &(0x7f0000001100)) openat$cgroup_type(r4, &(0x7f00000000c0), 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) 23:43:15 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 23:43:15 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 23:43:15 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) (async) r2 = gettid() r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r3}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r3, r3, r5, r4, r3, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="6f0c8cbce8e468a7c100d99c34567e950000200000000085100000fdffffff"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r3, r6], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000b40)={r4}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r4}) (async) ioctl$TUNGETVNETBE(r4, 0x800454df, &(0x7f0000001100)) (async) openat$cgroup_type(r4, &(0x7f00000000c0), 0x2, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) 23:43:15 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 23:43:15 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:15 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 23:43:15 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:15 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) (async) r2 = gettid() r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r3}, 0x18) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r3, r3, r5, r4, r3, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="6f0c8cbce8e468a7c100d99c34567e950000200000000085100000fdffffff"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r3, r6], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000b40)={r4}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r4}) (async) ioctl$TUNGETVNETBE(r4, 0x800454df, &(0x7f0000001100)) openat$cgroup_type(r4, &(0x7f00000000c0), 0x2, 0x0) (async, rerun: 64) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) (async, rerun: 64) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) 23:43:16 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:16 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000300)=""/250, 0xfa}, {&(0x7f0000000400)=""/40, 0x28}], 0x6, &(0x7f00000004c0)=""/207, 0xcf}, 0x10) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) (async) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000300)=""/250, 0xfa}, {&(0x7f0000000400)=""/40, 0x28}], 0x6, &(0x7f00000004c0)=""/207, 0xcf}, 0x10) (async) 23:43:16 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:16 executing program 3: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000300)=""/250, 0xfa}, {&(0x7f0000000400)=""/40, 0x28}], 0x6, &(0x7f00000004c0)=""/207, 0xcf}, 0x10) 23:43:16 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 23:43:16 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:16 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 23:43:16 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:16 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40000000) 23:43:16 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:16 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 23:43:16 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:17 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:17 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x200}, 0x8) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000340)=""/100, 0x2e}, {&(0x7f0000000180)=""/135, 0x87}, {&(0x7f00000003c0)=""/193}], 0x2, &(0x7f0000000280)}, 0x1) 23:43:17 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000300)=""/250, 0xfa}, {&(0x7f0000000400)=""/40, 0x28}], 0x6, &(0x7f00000004c0)=""/207, 0xcf}, 0x10) 23:43:17 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:17 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:17 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:17 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 23:43:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x0, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:17 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) (async) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x0, 0x0, 0x0, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:17 executing program 0: socketpair(0x29, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r1}) 23:43:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x0, 0x0, 0x0, 0x0, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:17 executing program 0: socketpair(0x29, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r1}) 23:43:18 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:18 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:18 executing program 0: socketpair(0x29, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r1}) 23:43:18 executing program 2: r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040), 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r6}, 0x18) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r7, 0x0, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r7}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r6, r6, r8, r7, r6, r9, r7, 0xffffffffffffffff, r7, r7], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r7, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r6, r9], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b40)={r7}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000b80)={r7}) ioctl$TUNGETVNETBE(r7, 0x800454df, &(0x7f0000001100)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, r2, 0x4, r7}, 0x10) socketpair(0xf, 0x5, 0x0, &(0x7f0000000000)) 23:43:18 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:18 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:18 executing program 2: r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040), 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r6}, 0x18) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r7, 0x0, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r7}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r6, r6, r8, r7, r6, r9, r7, 0xffffffffffffffff, r7, r7], 0x0, 0x10, 0x6}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r6, r6, r8, r7, r6, r9, r7, 0xffffffffffffffff, r7, r7], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r7, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r6, r9], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r7, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r6, r9], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b40)={r7}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b40)={r7}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000b80)={r7}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000b80)={r7}) ioctl$TUNGETVNETBE(r7, 0x800454df, &(0x7f0000001100)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, r2, 0x4, r7}, 0x10) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, r2, 0x4, r7}, 0x10) socketpair(0xf, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair(0xf, 0x5, 0x0, &(0x7f0000000000)) 23:43:18 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:18 executing program 5: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:18 executing program 2: r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040), 0x10) (async) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) (async, rerun: 64) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (rerun: 64) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async, rerun: 64) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) (rerun: 64) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) (async) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) (async) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r6}, 0x18) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r7, 0x0, 0x0) (async) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r7}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r6, r6, r8, r7, r6, r9, r7, 0xffffffffffffffff, r7, r7], 0x0, 0x10, 0x6}, 0x90) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r7, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r6, r9], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async, rerun: 64) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b40)={r7}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000b80)={r7}) (async, rerun: 32) ioctl$TUNGETVNETBE(r7, 0x800454df, &(0x7f0000001100)) (async, rerun: 32) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, r2, 0x4, r7}, 0x10) (async) socketpair(0xf, 0x5, 0x0, &(0x7f0000000000)) 23:43:18 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:18 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/9, 0x9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:19 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:19 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:19 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3c, 0x1f, 0x4, 0xa6, 0x0, 0x7, 0x14000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x58, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x10000, 0xda9b, 0xd33, 0x8, 0xffff, 0x5a5, 0x2, 0x0, 0x7f, 0x0, 0x8000}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xbd, 0x0, &(0x7f0000000040)="75bdf9287bf60488b8a0dd60ada6a2476b89da15ccbbabe92c60619f96542552e1be11b9b62cd744656b2bc44b06e7b39a36de4b266b7c4f47c391f04b27b2a502b06ec1144f328bca8bc43760e16d344486b3926bc7e3f75ec6129211c9fd76b6a4348c3ae486c4a63c8f4bf15ced2a93df1fdff15cacf6c3edc70c9b4f17bcf0251d5770ca25e0f67c06dc4dd317bbc6f4499f50ff470fd01e941e0c8503e2337d7bac3f83a9ed65e0762b2cb6cc9709475af1d4a7ac15e97c3b1fda", 0x0, 0x0, 0x0, 0x85, 0x0, &(0x7f0000000100)="d7d903636f805db5b715ea594bac4fb53b07ac6762a3b10fc413b4349fdfef9fcb6a2c295f8364ff10529e1f8211609982b2a54fa9d8d474c74ba5333a93f3ecdb2905334f97e07e0d97c3519a46644a7c945f9df6a315c1f9eeddf3e98c9c64fc91af97c146b6d0eb48257fafa0fc5762b96e7ad852c262d2344545265b85e92c35671bf1", 0x0, 0x2, 0x0, 0x1f}, 0x50) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r4}, 0x18) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000400)={r4, 0x0, 0x1e, 0x0, &(0x7f0000000300)="df924e2ba34895db24efee6ee85086f8f1282136cb5d4eb2b41e5b746eb0", 0x0, 0x78, 0x0, 0x92, 0x0, &(0x7f0000000340)="b04b4a86a65393006511356ed0e84126a5ba23f86f22258d4de4bcca07f7eafceeb4c8cbd36989117ef8e9b7b9f4f60801ce429de356892f4e98f597d8cd11faeb0974823214745851b9cc689366b22163fbc463a5211da0e2884f1060f49f8d5393fa822c7a5448fc33757e7911fc95a611b2e5327d62312a262b93cd3c5ebc29fdcac3e446a880586bd1537cf7d2dbba51", 0x0, 0x2, 0x0, 0x8000}, 0x50) 23:43:19 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:19 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3c, 0x1f, 0x4, 0xa6, 0x0, 0x7, 0x14000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x58, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x10000, 0xda9b, 0xd33, 0x8, 0xffff, 0x5a5, 0x2, 0x0, 0x7f, 0x0, 0x8000}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xbd, 0x0, &(0x7f0000000040)="75bdf9287bf60488b8a0dd60ada6a2476b89da15ccbbabe92c60619f96542552e1be11b9b62cd744656b2bc44b06e7b39a36de4b266b7c4f47c391f04b27b2a502b06ec1144f328bca8bc43760e16d344486b3926bc7e3f75ec6129211c9fd76b6a4348c3ae486c4a63c8f4bf15ced2a93df1fdff15cacf6c3edc70c9b4f17bcf0251d5770ca25e0f67c06dc4dd317bbc6f4499f50ff470fd01e941e0c8503e2337d7bac3f83a9ed65e0762b2cb6cc9709475af1d4a7ac15e97c3b1fda", 0x0, 0x0, 0x0, 0x85, 0x0, &(0x7f0000000100)="d7d903636f805db5b715ea594bac4fb53b07ac6762a3b10fc413b4349fdfef9fcb6a2c295f8364ff10529e1f8211609982b2a54fa9d8d474c74ba5333a93f3ecdb2905334f97e07e0d97c3519a46644a7c945f9df6a315c1f9eeddf3e98c9c64fc91af97c146b6d0eb48257fafa0fc5762b96e7ad852c262d2344545265b85e92c35671bf1", 0x0, 0x2, 0x0, 0x1f}, 0x50) (async) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) (async) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r4}, 0x18) (async) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000400)={r4, 0x0, 0x1e, 0x0, &(0x7f0000000300)="df924e2ba34895db24efee6ee85086f8f1282136cb5d4eb2b41e5b746eb0", 0x0, 0x78, 0x0, 0x92, 0x0, &(0x7f0000000340)="b04b4a86a65393006511356ed0e84126a5ba23f86f22258d4de4bcca07f7eafceeb4c8cbd36989117ef8e9b7b9f4f60801ce429de356892f4e98f597d8cd11faeb0974823214745851b9cc689366b22163fbc463a5211da0e2884f1060f49f8d5393fa822c7a5448fc33757e7911fc95a611b2e5327d62312a262b93cd3c5ebc29fdcac3e446a880586bd1537cf7d2dbba51", 0x0, 0x2, 0x0, 0x8000}, 0x50) 23:43:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3c, 0x1f, 0x4, 0xa6, 0x0, 0x7, 0x14000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x58, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x10000, 0xda9b, 0xd33, 0x8, 0xffff, 0x5a5, 0x2, 0x0, 0x7f, 0x0, 0x8000}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xbd, 0x0, &(0x7f0000000040)="75bdf9287bf60488b8a0dd60ada6a2476b89da15ccbbabe92c60619f96542552e1be11b9b62cd744656b2bc44b06e7b39a36de4b266b7c4f47c391f04b27b2a502b06ec1144f328bca8bc43760e16d344486b3926bc7e3f75ec6129211c9fd76b6a4348c3ae486c4a63c8f4bf15ced2a93df1fdff15cacf6c3edc70c9b4f17bcf0251d5770ca25e0f67c06dc4dd317bbc6f4499f50ff470fd01e941e0c8503e2337d7bac3f83a9ed65e0762b2cb6cc9709475af1d4a7ac15e97c3b1fda", 0x0, 0x0, 0x0, 0x85, 0x0, &(0x7f0000000100)="d7d903636f805db5b715ea594bac4fb53b07ac6762a3b10fc413b4349fdfef9fcb6a2c295f8364ff10529e1f8211609982b2a54fa9d8d474c74ba5333a93f3ecdb2905334f97e07e0d97c3519a46644a7c945f9df6a315c1f9eeddf3e98c9c64fc91af97c146b6d0eb48257fafa0fc5762b96e7ad852c262d2344545265b85e92c35671bf1", 0x0, 0x2, 0x0, 0x1f}, 0x50) (async) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xbd, 0x0, &(0x7f0000000040)="75bdf9287bf60488b8a0dd60ada6a2476b89da15ccbbabe92c60619f96542552e1be11b9b62cd744656b2bc44b06e7b39a36de4b266b7c4f47c391f04b27b2a502b06ec1144f328bca8bc43760e16d344486b3926bc7e3f75ec6129211c9fd76b6a4348c3ae486c4a63c8f4bf15ced2a93df1fdff15cacf6c3edc70c9b4f17bcf0251d5770ca25e0f67c06dc4dd317bbc6f4499f50ff470fd01e941e0c8503e2337d7bac3f83a9ed65e0762b2cb6cc9709475af1d4a7ac15e97c3b1fda", 0x0, 0x0, 0x0, 0x85, 0x0, &(0x7f0000000100)="d7d903636f805db5b715ea594bac4fb53b07ac6762a3b10fc413b4349fdfef9fcb6a2c295f8364ff10529e1f8211609982b2a54fa9d8d474c74ba5333a93f3ecdb2905334f97e07e0d97c3519a46644a7c945f9df6a315c1f9eeddf3e98c9c64fc91af97c146b6d0eb48257fafa0fc5762b96e7ad852c262d2344545265b85e92c35671bf1", 0x0, 0x2, 0x0, 0x1f}, 0x50) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r4}, 0x18) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000400)={r4, 0x0, 0x1e, 0x0, &(0x7f0000000300)="df924e2ba34895db24efee6ee85086f8f1282136cb5d4eb2b41e5b746eb0", 0x0, 0x78, 0x0, 0x92, 0x0, &(0x7f0000000340)="b04b4a86a65393006511356ed0e84126a5ba23f86f22258d4de4bcca07f7eafceeb4c8cbd36989117ef8e9b7b9f4f60801ce429de356892f4e98f597d8cd11faeb0974823214745851b9cc689366b22163fbc463a5211da0e2884f1060f49f8d5393fa822c7a5448fc33757e7911fc95a611b2e5327d62312a262b93cd3c5ebc29fdcac3e446a880586bd1537cf7d2dbba51", 0x0, 0x2, 0x0, 0x8000}, 0x50) 23:43:19 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:19 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:19 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000b80)={r1}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00', r0}, 0x18) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) 23:43:19 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) [ 624.214444][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.221463][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 23:43:20 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:20 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000480)=@framed={{}, [@call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:20 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000b80)={r1}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00', r0}, 0x18) (async) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) (async) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) 23:43:20 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) 23:43:20 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:43:20 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000480)=@framed={{}, [@call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:20 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000b80)={r1}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00', r0}, 0x18) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) 23:43:20 executing program 0: socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) 23:43:20 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', r2, 0x4000, r0}, 0x18) 23:43:20 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000480)=@framed={{}, [@call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:20 executing program 0: socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) 23:43:20 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:21 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:21 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) (async) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', r2, 0x4000, r0}, 0x18) 23:43:21 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:21 executing program 0: socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) 23:43:21 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) 23:43:21 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:21 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', r2, 0x4000, r0}, 0x18) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) sendmsg$tipc(r3, 0x0, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', r2, 0x4000, r0}, 0x18) (async) 23:43:21 executing program 0: socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) 23:43:21 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, 0x0, 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:21 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0xfffffff9, 0x8}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x141400, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x11) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000001580)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000200)=""/173, 0xad}, {&(0x7f00000002c0)=""/58, 0x3a}, {&(0x7f0000000300)=""/46, 0x2e}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/210, 0xd2}, {&(0x7f0000001440)=""/29, 0x1d}], 0x6, &(0x7f0000001500)=""/111, 0x6f}, 0x10020) 23:43:21 executing program 0: socketpair(0x18, 0x0, 0x1, &(0x7f0000000000)) 23:43:21 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:22 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, 0xffffffffffffffff, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:22 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, 0x0, 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:22 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0xfffffff9, 0x8}, 0xc) (async, rerun: 64) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x141400, 0x0) (rerun: 64) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x11) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000001580)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000200)=""/173, 0xad}, {&(0x7f00000002c0)=""/58, 0x3a}, {&(0x7f0000000300)=""/46, 0x2e}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/210, 0xd2}, {&(0x7f0000001440)=""/29, 0x1d}], 0x6, &(0x7f0000001500)=""/111, 0x6f}, 0x10020) 23:43:22 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000000)) 23:43:22 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) 23:43:22 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000000)) 23:43:22 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:43:22 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, 0x0, 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:22 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000000)) 23:43:22 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0xfffffff9, 0x8}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x141400, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x11) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000001580)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000200)=""/173, 0xad}, {&(0x7f00000002c0)=""/58, 0x3a}, {&(0x7f0000000300)=""/46, 0x2e}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/210, 0xd2}, {&(0x7f0000001440)=""/29, 0x1d}], 0x6, &(0x7f0000001500)=""/111, 0x6f}, 0x10020) 23:43:22 executing program 0: socketpair(0x18, 0x0, 0x1, 0x0) 23:43:22 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:23 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, 0xffffffffffffffff, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:23 executing program 0: socketpair(0x18, 0x0, 0x1, 0x0) 23:43:23 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:23 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:23 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) 23:43:23 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:23 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) 23:43:23 executing program 0: socketpair(0x18, 0x0, 0x1, 0x0) 23:43:23 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:23 executing program 0: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:23 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:23 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:24 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:24 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:24 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, 0xffffffffffffffff, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:24 executing program 0: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:24 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) 23:43:24 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:24 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) 23:43:24 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:24 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:25 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:25 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:25 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:25 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:25 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:26 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, 0xffffffffffffffff, r11, r8, r12, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:26 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:26 executing program 0: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:26 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) 23:43:26 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) 23:43:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:26 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:26 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:26 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:27 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, 0xffffffffffffffff, r11, r8, r12, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:27 executing program 0: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:27 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) 23:43:27 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) 23:43:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, 0x0, 0x0, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:27 executing program 0: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, 0x0, 0x0, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:27 executing program 0: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:28 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, 0xffffffffffffffff, r11, r8, r12, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, 0x0, 0x0, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:28 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 23:43:28 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) 23:43:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x40) 23:43:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600)={0x0, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x40) 23:43:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x40) 23:43:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:29 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:29 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:29 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:29 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) 23:43:29 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) 23:43:29 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:29 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) 23:43:30 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:30 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) 23:43:30 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:31 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) 23:43:31 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:31 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) 23:43:31 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 23:43:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:31 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x0, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:31 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:32 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:32 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:32 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) 23:43:32 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) 23:43:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:32 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:32 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:33 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, 0xffffffffffffffff, r8, r12, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:33 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x40000122) 23:43:33 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) 23:43:33 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) 23:43:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x40000122) 23:43:33 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x40000122) 23:43:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:33 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:34 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, 0xffffffffffffffff, r8, r12, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:34 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:34 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:34 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) 23:43:35 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) 23:43:35 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {0x0}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:35 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {0x0}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:35 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {0x0}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:36 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, 0xffffffffffffffff, r8, r12, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:36 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:36 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) 23:43:36 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) 23:43:36 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:36 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:36 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161", 0xf}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:38 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r11, r10, r7, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r7, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r7, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:38 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:38 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40000122) 23:43:38 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) 23:43:38 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) 23:43:38 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:38 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:38 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:38 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:38 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:38 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114", 0x8}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:39 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r11, r10, r7, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r7, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r7, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:39 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:39 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 23:43:39 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) 23:43:39 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) 23:43:39 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x45) 23:43:39 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:39 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:39 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:39 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:39 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:40 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r11, r10, r7, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r7, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r7, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:40 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:40 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 23:43:40 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) 23:43:40 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) 23:43:40 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:41 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:41 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:41 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:41 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:41 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:42 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:42 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 23:43:42 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) 23:43:42 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) 23:43:42 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2, 0x0, 0x0, 0x20008001}, 0x40) 23:43:42 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x40) 23:43:42 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:43 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:43 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:43 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:43 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:43 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) 23:43:43 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) 23:43:43 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:43 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:43 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:44 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:44 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:44 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:45 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:45 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:45 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:45 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:45 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) 23:43:45 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) 23:43:45 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:45 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:45 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:45 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x40) 23:43:45 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:45 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x40) 23:43:47 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:47 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:47 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x40) 23:43:47 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x40) 23:43:47 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) 23:43:47 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) 23:43:47 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:47 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:47 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:47 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:47 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:47 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:48 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:48 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:48 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:48 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) 23:43:48 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) 23:43:48 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:48 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:48 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:49 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:49 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:49 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) [ 658.064917][ T7016] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 660.192530][ T7016] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 660.733765][T14135] chnl_net:caif_netlink_parms(): no params data found [ 661.882026][ T3576] Bluetooth: hci1: command 0x0409 tx timeout [ 662.032662][ T7016] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 662.422969][ T7016] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 662.552213][T14135] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.559520][T14135] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.592935][T14135] device bridge_slave_0 entered promiscuous mode [ 662.613159][T14135] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.633507][T14135] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.641596][T14135] device bridge_slave_1 entered promiscuous mode [ 662.935524][T14135] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 662.977324][T14135] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 663.552578][T14135] team0: Port device team_slave_0 added [ 663.559973][T14135] team0: Port device team_slave_1 added [ 663.658225][T14135] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 663.681966][T14135] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 663.746954][T14135] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 663.802001][T14135] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 663.808962][T14135] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 663.869158][T14135] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 663.967535][ T13] Bluetooth: hci1: command 0x041b tx timeout [ 664.167738][T14135] device hsr_slave_0 entered promiscuous mode [ 664.232277][T14135] device hsr_slave_1 entered promiscuous mode [ 664.244409][T14135] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 664.265503][T14135] Cannot create hsr debugfs directory [ 666.042932][ T1067] Bluetooth: hci1: command 0x040f tx timeout [ 666.154086][T14135] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 666.261601][T14135] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 666.321272][T14135] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 666.442655][T14135] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 666.552508][T14135] 8021q: adding VLAN 0 to HW filter on device bond0 [ 666.574081][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 666.582497][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 666.592891][T14135] 8021q: adding VLAN 0 to HW filter on device team0 [ 666.621970][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 666.630626][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 666.653360][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 666.660435][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 666.694539][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 666.712402][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 666.722811][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 666.731180][ T3573] bridge0: port 2(bridge_slave_1) entered blocking state [ 666.738277][ T3573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 666.759062][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 666.770292][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 666.785155][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 666.813154][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 666.822971][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 666.845302][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 666.859188][T14135] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 666.882009][T14135] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 667.065015][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 667.082517][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 667.090942][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 667.110172][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 667.126721][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 667.164390][T14120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 667.688161][T14135] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 667.700813][T14120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 667.715025][T14120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 667.818712][T14191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 667.843797][T14191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 667.876933][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 667.892876][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 667.931090][T14135] device veth0_vlan entered promiscuous mode [ 667.938804][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 667.949176][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 667.981517][T14135] device veth1_vlan entered promiscuous mode [ 668.027528][ T7016] device hsr_slave_0 left promiscuous mode [ 668.035102][ T7016] device hsr_slave_1 left promiscuous mode [ 668.041617][ T7016] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 668.062022][ T7016] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 668.071716][ T7016] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 668.091914][ T7016] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 668.101122][ T7016] device bridge_slave_1 left promiscuous mode [ 668.108643][ T7016] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.121720][ T7016] device bridge_slave_0 left promiscuous mode [ 668.128372][T14120] Bluetooth: hci1: command 0x0419 tx timeout [ 668.136751][ T7016] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.160283][ T7016] device veth1_macvtap left promiscuous mode [ 668.166759][ T7016] device veth0_macvtap left promiscuous mode [ 668.173692][ T7016] device veth1_vlan left promiscuous mode [ 668.179594][ T7016] device veth0_vlan left promiscuous mode [ 668.340614][ T7016] team0 (unregistering): Port device team_slave_1 removed [ 668.358416][ T7016] team0 (unregistering): Port device team_slave_0 removed [ 668.369757][ T7016] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 668.389040][ T7016] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 668.437611][ T7016] bond0 (unregistering): Released all slaves [ 668.492446][T14191] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 668.500369][T14191] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 668.515738][T14135] device veth0_macvtap entered promiscuous mode [ 668.524043][ T3571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 668.532624][ T3571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 668.541074][ T3571] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 668.552825][T14135] device veth1_macvtap entered promiscuous mode [ 668.582938][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 668.593543][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.604494][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 668.615253][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.625493][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 668.636156][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.646208][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 668.656987][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.668127][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 668.678744][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.692129][T14135] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 668.701866][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 668.709716][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 668.718323][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 668.733391][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 668.743996][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.754307][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 668.766340][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.776345][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 668.790757][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.801199][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 668.812433][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.823082][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 668.834624][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.847665][T14135] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 668.856818][T14191] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 668.867137][T14191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 668.877670][T14135] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.887188][T14135] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.896301][T14135] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.905680][T14135] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.970848][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 668.988608][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 669.006493][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 669.006528][ T2617] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 669.025475][ T2617] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 669.035192][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 23:44:05 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:05 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) 23:44:05 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:05 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) 23:44:05 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) 23:44:05 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:05 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {0x0}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:05 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) 23:44:05 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {0x0}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:05 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) 23:44:05 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {0x0}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:05 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:44:06 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:44:06 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:06 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:44:06 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) 23:44:06 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) 23:44:06 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:06 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:06 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:44:06 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:06 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0}, 0x0) 23:44:06 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:06 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0}, 0x0) 23:44:07 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) 23:44:07 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:07 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0}, 0x0) 23:44:07 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:07 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) 23:44:07 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) 23:44:07 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:07 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 23:44:07 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:07 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 23:44:08 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2, 0x0, 0x0, 0x20008001}, 0x40) 23:44:08 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 23:44:08 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) 23:44:08 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x40) 23:44:08 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2}, 0x0) 23:44:08 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) 23:44:08 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:08 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) 23:44:08 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:44:08 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2}, 0x0) 23:44:08 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:44:08 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2}, 0x0) 23:44:09 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:44:09 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:09 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) 23:44:09 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:09 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:09 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) 23:44:09 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:09 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) 23:44:09 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:10 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:10 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1}, 0x0) 23:44:10 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:10 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1}, 0x0) 23:44:10 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:10 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) 23:44:10 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:10 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1}, 0x0) 23:44:10 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:10 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:10 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) 23:44:11 executing program 0: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:44:11 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:11 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:11 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:11 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:11 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:12 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) 23:44:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:12 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:12 executing program 0: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:44:12 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) 23:44:12 executing program 3: syz_clone(0x0, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:12 executing program 3: syz_clone(0x0, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:13 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) 23:44:13 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) 23:44:13 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00'}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r9, 0xffffffffffffffff, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[0xffffffffffffffff, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, 0xffffffffffffffff, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:13 executing program 0: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:44:13 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:13 executing program 3: syz_clone(0x0, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:13 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) 23:44:13 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) 23:44:13 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:13 executing program 3: syz_clone(0x44000, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:13 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:14 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:14 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) 23:44:14 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0}, 0x0) 23:44:15 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00'}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r9, 0xffffffffffffffff, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[0xffffffffffffffff, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, 0xffffffffffffffff, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:15 executing program 3: syz_clone(0x44000, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 0: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) 23:44:15 executing program 5: syz_clone(0x0, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 4: syz_clone(0x44000, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 4: syz_clone(0x44000, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 4: syz_clone(0x44000, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 5: syz_clone(0x0, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 3: syz_clone(0x44000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:16 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) 23:44:16 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") [ 685.654029][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.661055][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 747.093891][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.101119][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 785.011901][T14120] Bluetooth: hci1: command 0x0406 tx timeout [ 808.524924][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.531229][ T1377] ieee802154 phy1 wpan1: encryption failed: -22