x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b80)={r1}) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) ioctl$TUNATTACHFILTER(r10, 0x401054d5, &(0x7f0000000040)={0x9, &(0x7f00000000c0)=[{0x6, 0x9, 0x4, 0x240}, {0x6, 0x5, 0x2a, 0x1}, {0x1ff, 0xf9, 0x40, 0x20}, {0xfff, 0x80, 0x9, 0x401}, {0xf693, 0x0, 0x3, 0x8}, {0x681, 0x82, 0x5, 0x5}, {0xffc, 0x20, 0xf7, 0x8}, {0xa4e8, 0x7, 0xfd, 0x9}, {0x3, 0x0, 0xf5, 0x4}]}) 23:43:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 23:43:04 executing program 4: socketpair(0x18, 0x2, 0x0, &(0x7f0000000040)) 23:43:04 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b80)={r1}) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) ioctl$TUNATTACHFILTER(r10, 0x401054d5, &(0x7f0000000040)={0x9, &(0x7f00000000c0)=[{0x6, 0x9, 0x4, 0x240}, {0x6, 0x5, 0x2a, 0x1}, {0x1ff, 0xf9, 0x40, 0x20}, {0xfff, 0x80, 0x9, 0x401}, {0xf693, 0x0, 0x3, 0x8}, {0x681, 0x82, 0x5, 0x5}, {0xffc, 0x20, 0xf7, 0x8}, {0xa4e8, 0x7, 0xfd, 0x9}, {0x3, 0x0, 0xf5, 0x4}]}) 23:43:04 executing program 4: socketpair(0x18, 0x2, 0x0, &(0x7f0000000040)) 23:43:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 23:43:04 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/9, 0x9}, {&(0x7f0000000440)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:04 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/140, 0x8c}, {&(0x7f0000000100)=""/176, 0xb0}, {&(0x7f00000001c0)=""/250, 0xfa}], 0x3, &(0x7f0000000300)=""/6, 0x6}, 0x40012101) (async) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/140, 0x8c}, {&(0x7f0000000100)=""/176, 0xb0}, {&(0x7f00000001c0)=""/250, 0xfa}], 0x3, &(0x7f0000000300)=""/6, 0x6}, 0x40012101) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='tasks\x00', 0x2, 0x0) 23:43:04 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:04 executing program 4: socketpair(0x18, 0x2, 0x0, &(0x7f0000000040)) 23:43:04 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b80)={r1}) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) ioctl$TUNATTACHFILTER(r10, 0x401054d5, &(0x7f0000000040)={0x9, &(0x7f00000000c0)=[{0x6, 0x9, 0x4, 0x240}, {0x6, 0x5, 0x2a, 0x1}, {0x1ff, 0xf9, 0x40, 0x20}, {0xfff, 0x80, 0x9, 0x401}, {0xf693, 0x0, 0x3, 0x8}, {0x681, 0x82, 0x5, 0x5}, {0xffc, 0x20, 0xf7, 0x8}, {0xa4e8, 0x7, 0xfd, 0x9}, {0x3, 0x0, 0xf5, 0x4}]}) 23:43:04 executing program 4: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)) 23:43:04 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b80)={r1}) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:04 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) (async) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/140, 0x8c}, {&(0x7f0000000100)=""/176, 0xb0}, {&(0x7f00000001c0)=""/250, 0xfa}], 0x3, &(0x7f0000000300)=""/6, 0x6}, 0x40012101) (async) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='tasks\x00', 0x2, 0x0) 23:43:04 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 23:43:04 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b80)={r1}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:05 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:05 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:05 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 23:43:05 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/9, 0x9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:05 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:05 executing program 4: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)) 23:43:05 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 23:43:05 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) 23:43:05 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) (async) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) (async) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) (async) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) (async) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:05 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 23:43:05 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) 23:43:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 23:43:05 executing program 4: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)) 23:43:05 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:06 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/9, 0x9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 23:43:06 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:06 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) 23:43:06 executing program 4: socketpair(0x18, 0x0, 0x0, &(0x7f0000000040)) 23:43:06 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) (async) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) (async) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) (async) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) (async) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) (async) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 23:43:06 executing program 4: socketpair(0x18, 0x0, 0x0, 0x0) 23:43:06 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:06 executing program 0: socketpair(0x1, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8}, 0x48) 23:43:06 executing program 4: socketpair(0x18, 0x0, 0x0, 0x0) 23:43:07 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/9, 0x9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:07 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:07 executing program 0: socketpair(0x1, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:07 executing program 1: socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)) 23:43:07 executing program 4: socketpair(0x18, 0x0, 0x0, 0x0) 23:43:07 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000180)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x1, 0x3}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000080)="14c86c03e7f7299f8bad2806b34b92db68d5370f52e3c28fe4c62c4ae401ee66954f037ceb3e7c3c37128d", 0x2b}], 0x1, &(0x7f0000000100)="90694761cd0f89d8afe1bf214d2750e6908b74b727fe43d9d95ed3357275827ef6bda12e9cbe10f9204a8d90521c169a466d1b6f228608f8487b0c05c37e2cb70fe252421c350d50411fd068b14b3ab2f0133f3cddbf89fd16e4defef8ce75d30a475a", 0x63, 0x800}, 0x4008000) 23:43:07 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:07 executing program 4: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:07 executing program 0: socketpair(0x1, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:07 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:07 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000180)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x1, 0x3}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000080)="14c86c03e7f7299f8bad2806b34b92db68d5370f52e3c28fe4c62c4ae401ee66954f037ceb3e7c3c37128d", 0x2b}], 0x1, &(0x7f0000000100)="90694761cd0f89d8afe1bf214d2750e6908b74b727fe43d9d95ed3357275827ef6bda12e9cbe10f9204a8d90521c169a466d1b6f228608f8487b0c05c37e2cb70fe252421c350d50411fd068b14b3ab2f0133f3cddbf89fd16e4defef8ce75d30a475a", 0x63, 0x800}, 0x4008000) 23:43:07 executing program 4: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:08 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/9, 0x9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:08 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:08 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="762f49d3d6a5b0e38a0ef518400000fcffffff00000000000000003d850200fcffffff85200000020000000600000000"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)={r0}) 23:43:08 executing program 4: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r4, r4, r6, r5, r4, r7, r5, 0xffffffffffffffff, r5, r5], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r4, r7], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b40)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b80)={r5}) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000001100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x4}}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000280)="89f9c12303f709510564edb3", 0xc}, {&(0x7f00000002c0)="466d9782c7b3bcbbae45785266c971", 0xf}, {&(0x7f0000000300)="278991513ffb0810a2138a4bebcb7fc5f14475be1a2e21a7d93fd00d3533818277ca56f1127edaa84886dcbc029ea7ae708fceb5b25c3e0009137d91ab60013733b4e5b39bac681da54000ce", 0x4c}, {&(0x7f0000000bc0)="1767d6950c2ebbcb6c9ce4c6699be0c41b419332fdf1afac3b430423f6175da00c85a622c70644cdc6e1b1ba782dd1ac3d6609749f0146d43cbd52b8df22f2cc03f7ae1e7b85ed92e68bb974155f9d0fafe43b7374dadf4fad6f1fdd1f7de6cfb634bddc5dead681a5429c859c70b310be240786a5f23f3a9845a6526fafd00b9572170b7b1c6f465c32163fea3e93343d46db4d5fbb13ab85b8eec71e02af5314dd08e1d5eb86cf2c8223def0841b405a32ebd6db2db750eb4f4aa0ea5f24fe0a912c7d59c23079c7dff9786eed980240926b8a", 0xd4}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2bd99942ef5d6b397ccc028cd4d8b857965097c193af487b90a64c6f5ee7cc7f1f184df5b005bfd7b3f524e6714316c7a6be1ab053ffa4", 0x37}, {&(0x7f0000000cc0)="715713ac8664087ac591c560a4e7194e01f5469f12c49253fc8b1d9853b9796034a9aef1a4c90cac5b0b730b57d11062b52552fd790642a627ecacad4728e838bd4e0df7ffddbbd35bdd53ac5ad9be902363f1cce3a16f7cfe821a0aa7feab98ff68094e7b691e2e822b666b7984afb3927b67bd917a56387a3a6eb876487c7d4a92f61439186a1dbeefa369b4846d2cf38cb36aac02a7a36d", 0x99}, {&(0x7f0000000d80)="6ec25890e10365bf57c2b2f0a01ca5bce84e841245c3ccbcb37df7af5b97bb0ab7e275ad78064aa536c6fff93d84c7d96482ce65d5c1f03815e7b7e662eb4f78572d5c80c30cded93ca60b2b67a7070046ca434362081da4601fe5e98a590bfd2d4968053420ee81e62952f2aae53019f1e8ecb9b49f78bb85c63416aff81347d86e3e0a6080cfefe899a14e569b32cb08e2872e1390e7aefab8469e58bb0cab3f0cb6c3fe618d6fa3ba0611837fc1c4141dbdf567781a7993e3a3246e3ca26fedee0cbc82d2", 0xc6}, {&(0x7f0000000400)="e8c466935c23268f4e20729f4436d0", 0xf}], 0x9, &(0x7f0000000f40)="5b54d8a4d182f94fb4d94fa47be333365a6d0771af2566f7033824dd9ff38c7f7c5bfe534df0f7e206d3db60d9cce0c62054d6e2fa2b9eb67ab7850b02f4484e60532c64e0efd42a0584fe65015ad0675f2ca2507ccfedf1cae84da7d74d06e938d1b8051f3fcf2d20e96c76f003aed6e9113e6356600e326c49db0b5c6085fbaf83e7613331a11f711a5909f4aabfcf49af57168f59c6", 0x97, 0x4000080}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:08 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000180)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x1, 0x3}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000080)="14c86c03e7f7299f8bad2806b34b92db68d5370f52e3c28fe4c62c4ae401ee66954f037ceb3e7c3c37128d", 0x2b}], 0x1, &(0x7f0000000100)="90694761cd0f89d8afe1bf214d2750e6908b74b727fe43d9d95ed3357275827ef6bda12e9cbe10f9204a8d90521c169a466d1b6f228608f8487b0c05c37e2cb70fe252421c350d50411fd068b14b3ab2f0133f3cddbf89fd16e4defef8ce75d30a475a", 0x63, 0x800}, 0x4008000) 23:43:08 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:08 executing program 2: socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) 23:43:08 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r5}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x7, 0x10}, 0xc) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r0}, 0x8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x268b4fb70c8a0cc5, 0x4f, 0xfff, 0x7, 0x442, r1, 0xfffffffc, '\x00', 0x0, r0, 0x4, 0x0, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, r7, r8, r1, r9], 0x0, 0x10, 0x5}, 0x45) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={0x0}, 0x9) 23:43:08 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="762f49d3d6a5b0e38a0ef518400000fcffffff00000000000000003d850200fcffffff85200000020000000600000000"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)={r0}) socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) sendmsg$tipc(r2, 0x0, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="762f49d3d6a5b0e38a0ef518400000fcffffff00000000000000003d850200fcffffff85200000020000000600000000"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) (async) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)={r0}) (async) 23:43:08 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:08 executing program 2: socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) (async) 23:43:09 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x7, 0x10}, 0xc) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r0}, 0x8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x268b4fb70c8a0cc5, 0x4f, 0xfff, 0x7, 0x442, r1, 0xfffffffc, '\x00', 0x0, r0, 0x4, 0x0, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, r7, r8, r1, r9], 0x0, 0x10, 0x5}, 0x45) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={0x0}, 0x9) 23:43:09 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="762f49d3d6a5b0e38a0ef518400000fcffffff00000000000000003d850200fcffffff85200000020000000600000000"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)={r0}) socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) sendmsg$tipc(r2, 0x0, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="762f49d3d6a5b0e38a0ef518400000fcffffff00000000000000003d850200fcffffff85200000020000000600000000"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) (async) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)={r0}) (async) 23:43:09 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:09 executing program 2: socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) 23:43:09 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x7, 0x10}, 0xc) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r0}, 0x8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x268b4fb70c8a0cc5, 0x4f, 0xfff, 0x7, 0x442, r1, 0xfffffffc, '\x00', 0x0, r0, 0x4, 0x0, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, r7, r8, r1, r9], 0x0, 0x10, 0x5}, 0x45) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@o_path={0x0}, 0x9) 23:43:09 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:09 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x200}, 0x8) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000340)=""/100, 0x2e}, {&(0x7f0000000180)=""/135, 0x87}, {&(0x7f00000003c0)=""/193}], 0x2, &(0x7f0000000280)}, 0x1) 23:43:09 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) 23:43:09 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x7, 0x10}, 0xc) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r0}, 0x8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x268b4fb70c8a0cc5, 0x4f, 0xfff, 0x7, 0x442, r1, 0xfffffffc, '\x00', 0x0, r0, 0x4, 0x0, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, r7, r8, r1, r9], 0x0, 0x10, 0x5}, 0x45) 23:43:10 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:10 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:10 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x200}, 0x8) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000340)=""/100, 0x2e}, {&(0x7f0000000180)=""/135, 0x87}, {&(0x7f00000003c0)=""/193}], 0x2, &(0x7f0000000280)}, 0x1) (async) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000340)=""/100, 0x2e}, {&(0x7f0000000180)=""/135, 0x87}, {&(0x7f00000003c0)=""/193}], 0x2, &(0x7f0000000280)}, 0x1) 23:43:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x7, 0x10}, 0xc) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000680)={r0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, r7, r8, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:10 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x9, 0x8}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) (async) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) 23:43:10 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:43:10 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:10 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) (async, rerun: 32) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x9, 0x8}, 0xc) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) 23:43:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0x0, 0x7, 0x10}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, r7, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:10 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x200}, 0x8) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000340)=""/100, 0x2e}, {&(0x7f0000000180)=""/135, 0x87}, {&(0x7f00000003c0)=""/193}], 0x2, &(0x7f0000000280)}, 0x1) 23:43:10 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:10 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000b80)={r1}) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)=0x1) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000040)={r6}) 23:43:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r5, r4, r2, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:11 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:11 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000180)="7c4bda5c4be0932c4b87309dc4600abeeecc8bec62f374d3cd02d20e20fba08e933061a53448084f502642b79e43598b7e1e5c16", &(0x7f0000000280)=""/170}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, 0x1], 0x0, 0x10, 0x6}, 0x90) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r6}, 0x18) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b40)={r9}) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x89e2, &(0x7f0000000b80)={r9}) ioctl$TUNGETVNETBE(r9, 0x800454df, &(0x7f0000001100)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x6, 0xfff, 0xb45, 0x40, r7, 0x4, '\x00', 0x0, r9, 0x1, 0x0, 0x1, 0x4}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1, r6}) 23:43:11 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000b80)={r1}) (async) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)=0x1) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000040)={r6}) 23:43:11 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:11 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:43:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:11 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:11 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b40)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000b80)={r1}) (async) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)=0x1) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000040)={r6}) 23:43:11 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000180)="7c4bda5c4be0932c4b87309dc4600abeeecc8bec62f374d3cd02d20e20fba08e933061a53448084f502642b79e43598b7e1e5c16", &(0x7f0000000280)=""/170}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, 0x1], 0x0, 0x10, 0x6}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, 0x1], 0x0, 0x10, 0x6}, 0x90) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r6}, 0x18) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r6}, 0x18) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) (async) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b40)={r9}) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x89e2, &(0x7f0000000b80)={r9}) ioctl$TUNGETVNETBE(r9, 0x800454df, &(0x7f0000001100)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x6, 0xfff, 0xb45, 0x40, r7, 0x4, '\x00', 0x0, r9, 0x1, 0x0, 0x1, 0x4}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1, r6}) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1, r6}) 23:43:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, r5, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:11 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:11 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x8, 0x0, 0x7f, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x7f, 0x76f}, 0x80405, 0x9, 0x930, 0x9, 0x4, 0x7fffffff, 0x5, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) 23:43:12 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:12 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x8, 0x0, 0x7f, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x7f, 0x76f}, 0x80405, 0x9, 0x930, 0x9, 0x4, 0x7fffffff, 0x5, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) 23:43:12 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:12 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:43:12 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:12 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000180)="7c4bda5c4be0932c4b87309dc4600abeeecc8bec62f374d3cd02d20e20fba08e933061a53448084f502642b79e43598b7e1e5c16", &(0x7f0000000280)=""/170}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, 0x1], 0x0, 0x10, 0x6}, 0x90) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r6}, 0x18) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) (async) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async, rerun: 32) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000b40)={r9}) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x89e2, &(0x7f0000000b80)={r9}) ioctl$TUNGETVNETBE(r9, 0x800454df, &(0x7f0000001100)) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x6, 0xfff, 0xb45, 0x40, r7, 0x4, '\x00', 0x0, r9, 0x1, 0x0, 0x1, 0x4}, 0x48) (async, rerun: 32) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1, r6}) 23:43:12 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x8, 0x0, 0x7f, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x7f, 0x76f}, 0x80405, 0x9, 0x930, 0x9, 0x4, 0x7fffffff, 0x5, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x8, 0x0, 0x7f, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x7f, 0x76f}, 0x80405, 0x9, 0x930, 0x9, 0x4, 0x7fffffff, 0x5, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) (async) 23:43:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:12 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000040)="bcbcf4926af0cab633488a3c8c331a17e806471955c1911e07f3c9e89534e0967fd9b8285e0c799ea3f25d360c0900f2875d0dbef1a102396b9db7485e6c7a0f756d18901ef4420b54109ee0723d2745710e2867083ed21c046d2255b90c4aaafd15b9791800983aa8fc4ff3233606", &(0x7f00000000c0)=""/172, &(0x7f0000000340)="33d4d57f6f0d8f0f14c4300e3e082206f29f896f6243d39e87fe0798ed70f235376711c92676cb37fecb8dfec430267db381969997cc4ac7f3029555cfb10cd39d147b6b9c10c227b6cb8ce0257f996d025cfecb8ce229e40540ab776167bd5115cb3dff89edd66d04d5309ec128138467732a83851dbfd9cc3ef2296c86f3d4539ffcf34ee6715240e8028622d2257730821b2974fde1df904f437447df4d8f0a35c15043c33afb07809742ddc74a8eb554b658288192281e70c610c76e0a92e3bb527bf1fa4da4a7a0416738aa80c62d6096281d4b82271ce031df178806830b80c1310dd375919d6d4a499e006cb8cb2431eb224c26", &(0x7f0000000280)="d436ea3bd785302ba000f6cf2bb6c6c03ec4f3a1479bca7e509b73ec1fd80b8ade78894acd39910a8f29b111b00859fe4f3d5fb751e5870cf2df3f06cccb7efbad5c9931023f6298f7a4b3fedbf75cd219105bc4808d2f6e81ce893ede039e6ff13da69e1f9ea6c6", 0x6, 0x1}, 0x38) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x4000, r0}, 0x18) 23:43:12 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:13 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:13 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000740)) socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000080)=""/213, 0xd5}, {&(0x7f0000000200)=""/133, 0x85}, {&(0x7f0000000180)=""/42, 0x2a}, {&(0x7f00000002c0)=""/172, 0xac}, {&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/230, 0xe6}], 0x6, &(0x7f0000000580)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x150}, 0x10001) 23:43:13 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r2 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:13 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:13 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000040)="bcbcf4926af0cab633488a3c8c331a17e806471955c1911e07f3c9e89534e0967fd9b8285e0c799ea3f25d360c0900f2875d0dbef1a102396b9db7485e6c7a0f756d18901ef4420b54109ee0723d2745710e2867083ed21c046d2255b90c4aaafd15b9791800983aa8fc4ff3233606", &(0x7f00000000c0)=""/172, &(0x7f0000000340)="33d4d57f6f0d8f0f14c4300e3e082206f29f896f6243d39e87fe0798ed70f235376711c92676cb37fecb8dfec430267db381969997cc4ac7f3029555cfb10cd39d147b6b9c10c227b6cb8ce0257f996d025cfecb8ce229e40540ab776167bd5115cb3dff89edd66d04d5309ec128138467732a83851dbfd9cc3ef2296c86f3d4539ffcf34ee6715240e8028622d2257730821b2974fde1df904f437447df4d8f0a35c15043c33afb07809742ddc74a8eb554b658288192281e70c610c76e0a92e3bb527bf1fa4da4a7a0416738aa80c62d6096281d4b82271ce031df178806830b80c1310dd375919d6d4a499e006cb8cb2431eb224c26", &(0x7f0000000280)="d436ea3bd785302ba000f6cf2bb6c6c03ec4f3a1479bca7e509b73ec1fd80b8ade78894acd39910a8f29b111b00859fe4f3d5fb751e5870cf2df3f06cccb7efbad5c9931023f6298f7a4b3fedbf75cd219105bc4808d2f6e81ce893ede039e6ff13da69e1f9ea6c6", 0x6, 0x1}, 0x38) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x4000, r0}, 0x18) 23:43:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:13 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:13 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000740)) (async, rerun: 32) socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000080)=""/213, 0xd5}, {&(0x7f0000000200)=""/133, 0x85}, {&(0x7f0000000180)=""/42, 0x2a}, {&(0x7f00000002c0)=""/172, 0xac}, {&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/230, 0xe6}], 0x6, &(0x7f0000000580)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x150}, 0x10001) 23:43:13 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000040)="bcbcf4926af0cab633488a3c8c331a17e806471955c1911e07f3c9e89534e0967fd9b8285e0c799ea3f25d360c0900f2875d0dbef1a102396b9db7485e6c7a0f756d18901ef4420b54109ee0723d2745710e2867083ed21c046d2255b90c4aaafd15b9791800983aa8fc4ff3233606", &(0x7f00000000c0)=""/172, &(0x7f0000000340)="33d4d57f6f0d8f0f14c4300e3e082206f29f896f6243d39e87fe0798ed70f235376711c92676cb37fecb8dfec430267db381969997cc4ac7f3029555cfb10cd39d147b6b9c10c227b6cb8ce0257f996d025cfecb8ce229e40540ab776167bd5115cb3dff89edd66d04d5309ec128138467732a83851dbfd9cc3ef2296c86f3d4539ffcf34ee6715240e8028622d2257730821b2974fde1df904f437447df4d8f0a35c15043c33afb07809742ddc74a8eb554b658288192281e70c610c76e0a92e3bb527bf1fa4da4a7a0416738aa80c62d6096281d4b82271ce031df178806830b80c1310dd375919d6d4a499e006cb8cb2431eb224c26", &(0x7f0000000280)="d436ea3bd785302ba000f6cf2bb6c6c03ec4f3a1479bca7e509b73ec1fd80b8ade78894acd39910a8f29b111b00859fe4f3d5fb751e5870cf2df3f06cccb7efbad5c9931023f6298f7a4b3fedbf75cd219105bc4808d2f6e81ce893ede039e6ff13da69e1f9ea6c6", 0x6, 0x1}, 0x38) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x4000, r0}, 0x18) 23:43:13 executing program 3: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:14 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:14 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x18) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000300)=""/20, 0x14}], 0x2, &(0x7f0000000380)=""/1, 0x1}, 0x40000040) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="18400000fcffffff4a900902d0ae55aa65fe02008240374a5647ab789a8376000000000000003d85000006201f00"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)=@o_path={&(0x7f00000001c0)='./file0\x00', r2, 0x4000, r6}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000100)}, 0x10) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r8, 0x0, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r8}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r9, r8, r7, r10, r8, 0xffffffffffffffff, r8, r8], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r7, r10], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b40)={r8}) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x89e2, &(0x7f0000000b80)={r8}) ioctl$TUNGETVNETBE(r8, 0x800454df, &(0x7f0000001100)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x4, r8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xec) 23:43:14 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) close(0xffffffffffffffff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:14 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:14 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x414102, 0x0) 23:43:14 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x18) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000300)=""/20, 0x14}], 0x2, &(0x7f0000000380)=""/1, 0x1}, 0x40000040) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="18400000fcffffff4a900902d0ae55aa65fe02008240374a5647ab789a8376000000000000003d85000006201f00"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="18400000fcffffff4a900902d0ae55aa65fe02008240374a5647ab789a8376000000000000003d85000006201f00"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)=@o_path={&(0x7f00000001c0)='./file0\x00', r2, 0x4000, r6}, 0x18) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)=@o_path={&(0x7f00000001c0)='./file0\x00', r2, 0x4000, r6}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000100)}, 0x10) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r8, 0x0, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r8}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r9, r8, r7, r10, r8, 0xffffffffffffffff, r8, r8], 0x0, 0x10, 0x6}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r9, r8, r7, r10, r8, 0xffffffffffffffff, r8, r8], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r7, r10], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b40)={r8}) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x89e2, &(0x7f0000000b80)={r8}) ioctl$TUNGETVNETBE(r8, 0x800454df, &(0x7f0000001100)) (async) ioctl$TUNGETVNETBE(r8, 0x800454df, &(0x7f0000001100)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x4, r8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xec) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xec) 23:43:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4010}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:14 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000740)) (async, rerun: 64) socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000080)=""/213, 0xd5}, {&(0x7f0000000200)=""/133, 0x85}, {&(0x7f0000000180)=""/42, 0x2a}, {&(0x7f00000002c0)=""/172, 0xac}, {&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/230, 0xe6}], 0x6, &(0x7f0000000580)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x150}, 0x10001) 23:43:14 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x18) (async) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000300)=""/20, 0x14}], 0x2, &(0x7f0000000380)=""/1, 0x1}, 0x40000040) (async, rerun: 32) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) (async, rerun: 32) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (rerun: 32) sendmsg$tipc(r2, 0x0, 0x0) (async) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async, rerun: 64) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="18400000fcffffff4a900902d0ae55aa65fe02008240374a5647ab789a8376000000000000003d85000006201f00"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async, rerun: 64) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)=@o_path={&(0x7f00000001c0)='./file0\x00', r2, 0x4000, r6}, 0x18) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000100)}, 0x10) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) (async, rerun: 32) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (rerun: 32) sendmsg$tipc(r8, 0x0, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async, rerun: 32) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r8}, 0x18) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r9, r8, r7, r10, r8, 0xffffffffffffffff, r8, r8], 0x0, 0x10, 0x6}, 0x90) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r7, r10], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (rerun: 32) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000b40)={r8}) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x89e2, &(0x7f0000000b80)={r8}) (async) ioctl$TUNGETVNETBE(r8, 0x800454df, &(0x7f0000001100)) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x4, r8}, 0x10) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xec) 23:43:14 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x414102, 0x0) 23:43:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, r0, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:15 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:15 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x414102, 0x0) 23:43:15 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:15 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000300)=""/250, 0xfa}, {&(0x7f0000000400)=""/40, 0x28}], 0x6, &(0x7f00000004c0)=""/207, 0xcf}, 0x10) 23:43:15 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:15 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 23:43:15 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 23:43:15 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) r2 = gettid() r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r3}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r3, r3, r5, r4, r3, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="6f0c8cbce8e468a7c100d99c34567e950000200000000085100000fdffffff"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r3, r6], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000b40)={r4}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r4}) ioctl$TUNGETVNETBE(r4, 0x800454df, &(0x7f0000001100)) openat$cgroup_type(r4, &(0x7f00000000c0), 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) 23:43:15 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 23:43:15 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 23:43:15 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) (async) r2 = gettid() r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r3}, 0x18) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r3, r3, r5, r4, r3, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="6f0c8cbce8e468a7c100d99c34567e950000200000000085100000fdffffff"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r3, r6], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000b40)={r4}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r4}) (async) ioctl$TUNGETVNETBE(r4, 0x800454df, &(0x7f0000001100)) (async) openat$cgroup_type(r4, &(0x7f00000000c0), 0x2, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) 23:43:15 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 23:43:15 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:15 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 23:43:15 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:15 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) (async) r2 = gettid() r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r3}, 0x18) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r4, 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r3, r3, r5, r4, r3, r6, r4, 0xffffffffffffffff, r4, r4], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="6f0c8cbce8e468a7c100d99c34567e950000200000000085100000fdffffff"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r3, r6], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000b40)={r4}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r4}) (async) ioctl$TUNGETVNETBE(r4, 0x800454df, &(0x7f0000001100)) openat$cgroup_type(r4, &(0x7f00000000c0), 0x2, 0x0) (async, rerun: 64) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) (async, rerun: 64) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) 23:43:16 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:16 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000300)=""/250, 0xfa}, {&(0x7f0000000400)=""/40, 0x28}], 0x6, &(0x7f00000004c0)=""/207, 0xcf}, 0x10) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) (async) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000300)=""/250, 0xfa}, {&(0x7f0000000400)=""/40, 0x28}], 0x6, &(0x7f00000004c0)=""/207, 0xcf}, 0x10) (async) 23:43:16 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:16 executing program 3: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000300)=""/250, 0xfa}, {&(0x7f0000000400)=""/40, 0x28}], 0x6, &(0x7f00000004c0)=""/207, 0xcf}, 0x10) 23:43:16 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 23:43:16 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:16 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 23:43:16 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:16 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40000000) 23:43:16 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x4, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:16 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 23:43:16 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:17 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:17 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x200}, 0x8) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000340)=""/100, 0x2e}, {&(0x7f0000000180)=""/135, 0x87}, {&(0x7f00000003c0)=""/193}], 0x2, &(0x7f0000000280)}, 0x1) 23:43:17 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000300)=""/250, 0xfa}, {&(0x7f0000000400)=""/40, 0x28}], 0x6, &(0x7f00000004c0)=""/207, 0xcf}, 0x10) 23:43:17 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:17 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:17 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:17 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 23:43:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x0, 0x0, 0x5, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:17 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) (async) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x0, 0x0, 0x0, 0xa, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:17 executing program 0: socketpair(0x29, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r1}) 23:43:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x0, 0x0, 0x0, 0x0, 0x6, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:17 executing program 0: socketpair(0x29, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r1}) 23:43:18 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:18 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:18 executing program 0: socketpair(0x29, 0x0, 0xffffffe0, &(0x7f0000003800)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r1}) 23:43:18 executing program 2: r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040), 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r6}, 0x18) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r7, 0x0, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r7}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r6, r6, r8, r7, r6, r9, r7, 0xffffffffffffffff, r7, r7], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r7, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r6, r9], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b40)={r7}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000b80)={r7}) ioctl$TUNGETVNETBE(r7, 0x800454df, &(0x7f0000001100)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, r2, 0x4, r7}, 0x10) socketpair(0xf, 0x5, 0x0, &(0x7f0000000000)) 23:43:18 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:18 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call={0x85, 0x0, 0x0, 0xb2}, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:18 executing program 2: r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040), 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r6}, 0x18) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r7, 0x0, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r7}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r6, r6, r8, r7, r6, r9, r7, 0xffffffffffffffff, r7, r7], 0x0, 0x10, 0x6}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r6, r6, r8, r7, r6, r9, r7, 0xffffffffffffffff, r7, r7], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r7, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r6, r9], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r7, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r6, r9], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b40)={r7}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b40)={r7}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000b80)={r7}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000b80)={r7}) ioctl$TUNGETVNETBE(r7, 0x800454df, &(0x7f0000001100)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, r2, 0x4, r7}, 0x10) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, r2, 0x4, r7}, 0x10) socketpair(0xf, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair(0xf, 0x5, 0x0, &(0x7f0000000000)) 23:43:18 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:18 executing program 5: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18400000fcffffff00000000000000003d850200fcffffff85200000020000000600008919578de25358000000000011000000000000000a5109426be3ccee9a364a88e9c68dad5b6f1ba41cf8e49276d03981f9fc26314709"], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="95000000000000008510e216fdfffff6"], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r4}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x414102, 0x0) 23:43:18 executing program 2: r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040), 0x10) (async) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) (async, rerun: 64) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (rerun: 64) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async, rerun: 64) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) (rerun: 64) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) (async) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) (async) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r6}, 0x18) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r7, 0x0, 0x0) (async) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r7}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r6, r6, r8, r7, r6, r9, r7, 0xffffffffffffffff, r7, r7], 0x0, 0x10, 0x6}, 0x90) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r7, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r6, r9], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async, rerun: 64) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b40)={r7}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000b80)={r7}) (async, rerun: 32) ioctl$TUNGETVNETBE(r7, 0x800454df, &(0x7f0000001100)) (async, rerun: 32) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, r2, 0x4, r7}, 0x10) (async) socketpair(0xf, 0x5, 0x0, &(0x7f0000000000)) 23:43:18 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:18 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/9, 0x9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001a00)=""/164, 0xa4}, 0x40000000) 23:43:19 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:19 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:19 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3c, 0x1f, 0x4, 0xa6, 0x0, 0x7, 0x14000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x58, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x10000, 0xda9b, 0xd33, 0x8, 0xffff, 0x5a5, 0x2, 0x0, 0x7f, 0x0, 0x8000}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xbd, 0x0, &(0x7f0000000040)="75bdf9287bf60488b8a0dd60ada6a2476b89da15ccbbabe92c60619f96542552e1be11b9b62cd744656b2bc44b06e7b39a36de4b266b7c4f47c391f04b27b2a502b06ec1144f328bca8bc43760e16d344486b3926bc7e3f75ec6129211c9fd76b6a4348c3ae486c4a63c8f4bf15ced2a93df1fdff15cacf6c3edc70c9b4f17bcf0251d5770ca25e0f67c06dc4dd317bbc6f4499f50ff470fd01e941e0c8503e2337d7bac3f83a9ed65e0762b2cb6cc9709475af1d4a7ac15e97c3b1fda", 0x0, 0x0, 0x0, 0x85, 0x0, &(0x7f0000000100)="d7d903636f805db5b715ea594bac4fb53b07ac6762a3b10fc413b4349fdfef9fcb6a2c295f8364ff10529e1f8211609982b2a54fa9d8d474c74ba5333a93f3ecdb2905334f97e07e0d97c3519a46644a7c945f9df6a315c1f9eeddf3e98c9c64fc91af97c146b6d0eb48257fafa0fc5762b96e7ad852c262d2344545265b85e92c35671bf1", 0x0, 0x2, 0x0, 0x1f}, 0x50) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r4}, 0x18) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000400)={r4, 0x0, 0x1e, 0x0, &(0x7f0000000300)="df924e2ba34895db24efee6ee85086f8f1282136cb5d4eb2b41e5b746eb0", 0x0, 0x78, 0x0, 0x92, 0x0, &(0x7f0000000340)="b04b4a86a65393006511356ed0e84126a5ba23f86f22258d4de4bcca07f7eafceeb4c8cbd36989117ef8e9b7b9f4f60801ce429de356892f4e98f597d8cd11faeb0974823214745851b9cc689366b22163fbc463a5211da0e2884f1060f49f8d5393fa822c7a5448fc33757e7911fc95a611b2e5327d62312a262b93cd3c5ebc29fdcac3e446a880586bd1537cf7d2dbba51", 0x0, 0x2, 0x0, 0x8000}, 0x50) 23:43:19 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:19 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3c, 0x1f, 0x4, 0xa6, 0x0, 0x7, 0x14000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x58, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x10000, 0xda9b, 0xd33, 0x8, 0xffff, 0x5a5, 0x2, 0x0, 0x7f, 0x0, 0x8000}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xbd, 0x0, &(0x7f0000000040)="75bdf9287bf60488b8a0dd60ada6a2476b89da15ccbbabe92c60619f96542552e1be11b9b62cd744656b2bc44b06e7b39a36de4b266b7c4f47c391f04b27b2a502b06ec1144f328bca8bc43760e16d344486b3926bc7e3f75ec6129211c9fd76b6a4348c3ae486c4a63c8f4bf15ced2a93df1fdff15cacf6c3edc70c9b4f17bcf0251d5770ca25e0f67c06dc4dd317bbc6f4499f50ff470fd01e941e0c8503e2337d7bac3f83a9ed65e0762b2cb6cc9709475af1d4a7ac15e97c3b1fda", 0x0, 0x0, 0x0, 0x85, 0x0, &(0x7f0000000100)="d7d903636f805db5b715ea594bac4fb53b07ac6762a3b10fc413b4349fdfef9fcb6a2c295f8364ff10529e1f8211609982b2a54fa9d8d474c74ba5333a93f3ecdb2905334f97e07e0d97c3519a46644a7c945f9df6a315c1f9eeddf3e98c9c64fc91af97c146b6d0eb48257fafa0fc5762b96e7ad852c262d2344545265b85e92c35671bf1", 0x0, 0x2, 0x0, 0x1f}, 0x50) (async) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) (async) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r4}, 0x18) (async) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000400)={r4, 0x0, 0x1e, 0x0, &(0x7f0000000300)="df924e2ba34895db24efee6ee85086f8f1282136cb5d4eb2b41e5b746eb0", 0x0, 0x78, 0x0, 0x92, 0x0, &(0x7f0000000340)="b04b4a86a65393006511356ed0e84126a5ba23f86f22258d4de4bcca07f7eafceeb4c8cbd36989117ef8e9b7b9f4f60801ce429de356892f4e98f597d8cd11faeb0974823214745851b9cc689366b22163fbc463a5211da0e2884f1060f49f8d5393fa822c7a5448fc33757e7911fc95a611b2e5327d62312a262b93cd3c5ebc29fdcac3e446a880586bd1537cf7d2dbba51", 0x0, 0x2, 0x0, 0x8000}, 0x50) 23:43:19 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3c, 0x1f, 0x4, 0xa6, 0x0, 0x7, 0x14000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x58, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x10000, 0xda9b, 0xd33, 0x8, 0xffff, 0x5a5, 0x2, 0x0, 0x7f, 0x0, 0x8000}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xbd, 0x0, &(0x7f0000000040)="75bdf9287bf60488b8a0dd60ada6a2476b89da15ccbbabe92c60619f96542552e1be11b9b62cd744656b2bc44b06e7b39a36de4b266b7c4f47c391f04b27b2a502b06ec1144f328bca8bc43760e16d344486b3926bc7e3f75ec6129211c9fd76b6a4348c3ae486c4a63c8f4bf15ced2a93df1fdff15cacf6c3edc70c9b4f17bcf0251d5770ca25e0f67c06dc4dd317bbc6f4499f50ff470fd01e941e0c8503e2337d7bac3f83a9ed65e0762b2cb6cc9709475af1d4a7ac15e97c3b1fda", 0x0, 0x0, 0x0, 0x85, 0x0, &(0x7f0000000100)="d7d903636f805db5b715ea594bac4fb53b07ac6762a3b10fc413b4349fdfef9fcb6a2c295f8364ff10529e1f8211609982b2a54fa9d8d474c74ba5333a93f3ecdb2905334f97e07e0d97c3519a46644a7c945f9df6a315c1f9eeddf3e98c9c64fc91af97c146b6d0eb48257fafa0fc5762b96e7ad852c262d2344545265b85e92c35671bf1", 0x0, 0x2, 0x0, 0x1f}, 0x50) (async) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xbd, 0x0, &(0x7f0000000040)="75bdf9287bf60488b8a0dd60ada6a2476b89da15ccbbabe92c60619f96542552e1be11b9b62cd744656b2bc44b06e7b39a36de4b266b7c4f47c391f04b27b2a502b06ec1144f328bca8bc43760e16d344486b3926bc7e3f75ec6129211c9fd76b6a4348c3ae486c4a63c8f4bf15ced2a93df1fdff15cacf6c3edc70c9b4f17bcf0251d5770ca25e0f67c06dc4dd317bbc6f4499f50ff470fd01e941e0c8503e2337d7bac3f83a9ed65e0762b2cb6cc9709475af1d4a7ac15e97c3b1fda", 0x0, 0x0, 0x0, 0x85, 0x0, &(0x7f0000000100)="d7d903636f805db5b715ea594bac4fb53b07ac6762a3b10fc413b4349fdfef9fcb6a2c295f8364ff10529e1f8211609982b2a54fa9d8d474c74ba5333a93f3ecdb2905334f97e07e0d97c3519a46644a7c945f9df6a315c1f9eeddf3e98c9c64fc91af97c146b6d0eb48257fafa0fc5762b96e7ad852c262d2344545265b85e92c35671bf1", 0x0, 0x2, 0x0, 0x1f}, 0x50) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d40)=@o_path={&(0x7f0000000d00)='./file0\x00', 0x0, 0x2000, r4}, 0x18) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000400)={r4, 0x0, 0x1e, 0x0, &(0x7f0000000300)="df924e2ba34895db24efee6ee85086f8f1282136cb5d4eb2b41e5b746eb0", 0x0, 0x78, 0x0, 0x92, 0x0, &(0x7f0000000340)="b04b4a86a65393006511356ed0e84126a5ba23f86f22258d4de4bcca07f7eafceeb4c8cbd36989117ef8e9b7b9f4f60801ce429de356892f4e98f597d8cd11faeb0974823214745851b9cc689366b22163fbc463a5211da0e2884f1060f49f8d5393fa822c7a5448fc33757e7911fc95a611b2e5327d62312a262b93cd3c5ebc29fdcac3e446a880586bd1537cf7d2dbba51", 0x0, 0x2, 0x0, 0x8000}, 0x50) 23:43:19 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:19 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 23:43:19 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000b80)={r1}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00', r0}, 0x18) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) 23:43:19 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) [ 624.214444][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.221463][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 23:43:20 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:20 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000480)=@framed={{}, [@call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:20 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000b80)={r1}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00', r0}, 0x18) (async) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) (async) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) 23:43:20 executing program 0: socketpair(0x0, 0x0, 0xffffffe0, &(0x7f0000003800)) socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) 23:43:20 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:43:20 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000480)=@framed={{}, [@call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:20 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r0, r0, r2, r1, r0, r3, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r0, r3], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000b80)={r1}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00', r0}, 0x18) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000001100)) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) 23:43:20 executing program 0: socketpair(0x18, 0x80000, 0x1, &(0x7f0000000000)) 23:43:20 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', r2, 0x4000, r0}, 0x18) 23:43:20 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000480)=@framed={{}, [@call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:20 executing program 0: socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) 23:43:20 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:21 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:21 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) (async) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', r2, 0x4000, r0}, 0x18) 23:43:21 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8f0}, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:21 executing program 0: socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) 23:43:21 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) 23:43:21 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:21 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', r2, 0x4000, r0}, 0x18) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) sendmsg$tipc(r3, 0x0, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', r2, 0x4000, r0}, 0x18) (async) 23:43:21 executing program 0: socketpair(0x0, 0x80000, 0x1, &(0x7f0000000000)) 23:43:21 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, 0x0, 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:21 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0xfffffff9, 0x8}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x141400, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x11) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000001580)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000200)=""/173, 0xad}, {&(0x7f00000002c0)=""/58, 0x3a}, {&(0x7f0000000300)=""/46, 0x2e}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/210, 0xd2}, {&(0x7f0000001440)=""/29, 0x1d}], 0x6, &(0x7f0000001500)=""/111, 0x6f}, 0x10020) 23:43:21 executing program 0: socketpair(0x18, 0x0, 0x1, &(0x7f0000000000)) 23:43:21 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:22 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, 0xffffffffffffffff, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:22 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, 0x0, 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:22 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0xfffffff9, 0x8}, 0xc) (async, rerun: 64) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x141400, 0x0) (rerun: 64) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x11) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000001580)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000200)=""/173, 0xad}, {&(0x7f00000002c0)=""/58, 0x3a}, {&(0x7f0000000300)=""/46, 0x2e}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/210, 0xd2}, {&(0x7f0000001440)=""/29, 0x1d}], 0x6, &(0x7f0000001500)=""/111, 0x6f}, 0x10020) 23:43:22 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000000)) 23:43:22 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) 23:43:22 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000000)) 23:43:22 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:43:22 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, 0x0, 0x101, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:22 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000000)) 23:43:22 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0xfffffff9, 0x8}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x141400, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x11) (async) socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000001580)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000200)=""/173, 0xad}, {&(0x7f00000002c0)=""/58, 0x3a}, {&(0x7f0000000300)=""/46, 0x2e}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/210, 0xd2}, {&(0x7f0000001440)=""/29, 0x1d}], 0x6, &(0x7f0000001500)=""/111, 0x6f}, 0x10020) 23:43:22 executing program 0: socketpair(0x18, 0x0, 0x1, 0x0) 23:43:22 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:23 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, 0xffffffffffffffff, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:23 executing program 0: socketpair(0x18, 0x0, 0x1, 0x0) 23:43:23 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:23 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:23 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) 23:43:23 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:23 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) 23:43:23 executing program 0: socketpair(0x18, 0x0, 0x1, 0x0) 23:43:23 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:23 executing program 0: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:23 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:23 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:24 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:24 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:24 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, 0xffffffffffffffff, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, 0xffffffffffffffff], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:24 executing program 0: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:24 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) 23:43:24 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:24 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) 23:43:24 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:24 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:25 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:25 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:25 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:25 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:25 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:26 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, 0xffffffffffffffff, r11, r8, r12, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:26 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:26 executing program 0: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:26 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) 23:43:26 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) 23:43:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:26 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:26 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:26 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:27 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, 0xffffffffffffffff, r11, r8, r12, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:27 executing program 0: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:27 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) 23:43:27 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) 23:43:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, 0x0, 0x0, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:27 executing program 0: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:27 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, 0x0, 0x0, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:27 executing program 0: bpf$OBJ_PIN_MAP(0x8, &(0x7f0000000080)=@o_path={0x0}, 0x18) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:28 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, 0xffffffffffffffff, r11, r8, r12, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, 0x0, 0x0, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:28 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 23:43:28 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) 23:43:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x40) 23:43:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600)={0x0, 0x0, 0x1, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x40) 23:43:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x4e}, 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x40) 23:43:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x1c815, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:29 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:29 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:29 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x45) 23:43:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:29 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) 23:43:29 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) 23:43:29 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:29 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) 23:43:30 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:30 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) 23:43:30 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:31 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) 23:43:31 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x43, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:31 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) 23:43:31 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 23:43:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:31 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x0, 0x4}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:31 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:32 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r11}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r11, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r12, r11, r8, r13, r11, 0xffffffffffffffff, r11, r11], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r13], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:32 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161147d4ba7370b404b45d3819754b4c5", 0x1e}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:32 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) 23:43:32 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) 23:43:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:32 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:32 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:33 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, 0xffffffffffffffff, r8, r12, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:33 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x40000122) 23:43:33 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) 23:43:33 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) 23:43:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x40000122) 23:43:33 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x40000122) 23:43:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:33 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:34 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, 0xffffffffffffffff, r8, r12, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:34 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000140)=""/223, 0xdf}], 0x2, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:34 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:34 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) 23:43:35 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) 23:43:35 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {0x0}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:35 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {0x0}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:35 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {0x0}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:36 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, 0xffffffffffffffff, r8, r12, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:36 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/36, 0x24}, 0x40000122) 23:43:36 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) 23:43:36 executing program 3: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) 23:43:36 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:36 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:36 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114408ef06b945161", 0xf}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:38 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r11, r10, r7, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r7, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r7, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:38 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:38 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40000122) 23:43:38 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) 23:43:38 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) 23:43:38 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:38 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:38 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:38 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:38 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:38 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8ca229589734e114", 0x8}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:39 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r11, r10, r7, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r7, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r7, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:39 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) 23:43:39 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 23:43:39 executing program 5: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) 23:43:39 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) 23:43:39 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000480)=@framed={{}, [@map_val, @call, @alu]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x86, &(0x7f0000000500)=""/134, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000600), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x45) 23:43:39 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:39 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:39 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:39 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:39 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:40 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r7, r7, r11, r10, r7, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r7, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r7, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:40 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:40 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 23:43:40 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) 23:43:40 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f0000001100)) 23:43:40 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:41 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:41 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:41 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:41 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:41 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:42 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:42 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 23:43:42 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r2}) 23:43:42 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) 23:43:42 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2, 0x0, 0x0, 0x20008001}, 0x40) 23:43:42 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x40) 23:43:42 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:42 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:43 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:43 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:43 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:43 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:43 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={r2}) 23:43:43 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) 23:43:43 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:43 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:43 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:44 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:44 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:44 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:45 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:45 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:45 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:45 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:45 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) 23:43:45 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r1, r4], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) 23:43:45 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:45 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:45 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:45 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x40) 23:43:45 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:45 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x40) 23:43:47 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:47 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:47 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x40) 23:43:47 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x40) 23:43:47 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r1, r1, r3, r2, r1, r4, r2, 0xffffffffffffffff, r2, r2], 0x0, 0x10, 0x6}, 0x90) 23:43:47 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) 23:43:47 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:47 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:47 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:47 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:47 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:47 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:48 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:48 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:48 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:48 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) 23:43:48 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r2}, 0x18) 23:43:48 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:48 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:48 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:43:49 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:43:49 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:43:49 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) [ 658.064917][ T7016] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 660.192530][ T7016] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 660.733765][T14135] chnl_net:caif_netlink_parms(): no params data found [ 661.882026][ T3576] Bluetooth: hci1: command 0x0409 tx timeout [ 662.032662][ T7016] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 662.422969][ T7016] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 662.552213][T14135] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.559520][T14135] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.592935][T14135] device bridge_slave_0 entered promiscuous mode [ 662.613159][T14135] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.633507][T14135] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.641596][T14135] device bridge_slave_1 entered promiscuous mode [ 662.935524][T14135] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 662.977324][T14135] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 663.552578][T14135] team0: Port device team_slave_0 added [ 663.559973][T14135] team0: Port device team_slave_1 added [ 663.658225][T14135] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 663.681966][T14135] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 663.746954][T14135] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 663.802001][T14135] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 663.808962][T14135] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 663.869158][T14135] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 663.967535][ T13] Bluetooth: hci1: command 0x041b tx timeout [ 664.167738][T14135] device hsr_slave_0 entered promiscuous mode [ 664.232277][T14135] device hsr_slave_1 entered promiscuous mode [ 664.244409][T14135] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 664.265503][T14135] Cannot create hsr debugfs directory [ 666.042932][ T1067] Bluetooth: hci1: command 0x040f tx timeout [ 666.154086][T14135] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 666.261601][T14135] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 666.321272][T14135] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 666.442655][T14135] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 666.552508][T14135] 8021q: adding VLAN 0 to HW filter on device bond0 [ 666.574081][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 666.582497][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 666.592891][T14135] 8021q: adding VLAN 0 to HW filter on device team0 [ 666.621970][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 666.630626][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 666.653360][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 666.660435][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 666.694539][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 666.712402][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 666.722811][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 666.731180][ T3573] bridge0: port 2(bridge_slave_1) entered blocking state [ 666.738277][ T3573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 666.759062][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 666.770292][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 666.785155][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 666.813154][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 666.822971][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 666.845302][ T3573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 666.859188][T14135] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 666.882009][T14135] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 667.065015][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 667.082517][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 667.090942][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 667.110172][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 667.126721][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 667.164390][T14120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 667.688161][T14135] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 667.700813][T14120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 667.715025][T14120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 667.818712][T14191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 667.843797][T14191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 667.876933][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 667.892876][T14114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 667.931090][T14135] device veth0_vlan entered promiscuous mode [ 667.938804][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 667.949176][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 667.981517][T14135] device veth1_vlan entered promiscuous mode [ 668.027528][ T7016] device hsr_slave_0 left promiscuous mode [ 668.035102][ T7016] device hsr_slave_1 left promiscuous mode [ 668.041617][ T7016] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 668.062022][ T7016] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 668.071716][ T7016] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 668.091914][ T7016] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 668.101122][ T7016] device bridge_slave_1 left promiscuous mode [ 668.108643][ T7016] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.121720][ T7016] device bridge_slave_0 left promiscuous mode [ 668.128372][T14120] Bluetooth: hci1: command 0x0419 tx timeout [ 668.136751][ T7016] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.160283][ T7016] device veth1_macvtap left promiscuous mode [ 668.166759][ T7016] device veth0_macvtap left promiscuous mode [ 668.173692][ T7016] device veth1_vlan left promiscuous mode [ 668.179594][ T7016] device veth0_vlan left promiscuous mode [ 668.340614][ T7016] team0 (unregistering): Port device team_slave_1 removed [ 668.358416][ T7016] team0 (unregistering): Port device team_slave_0 removed [ 668.369757][ T7016] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 668.389040][ T7016] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 668.437611][ T7016] bond0 (unregistering): Released all slaves [ 668.492446][T14191] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 668.500369][T14191] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 668.515738][T14135] device veth0_macvtap entered promiscuous mode [ 668.524043][ T3571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 668.532624][ T3571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 668.541074][ T3571] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 668.552825][T14135] device veth1_macvtap entered promiscuous mode [ 668.582938][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 668.593543][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.604494][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 668.615253][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.625493][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 668.636156][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.646208][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 668.656987][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.668127][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 668.678744][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.692129][T14135] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 668.701866][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 668.709716][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 668.718323][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 668.733391][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 668.743996][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.754307][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 668.766340][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.776345][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 668.790757][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.801199][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 668.812433][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.823082][T14135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 668.834624][T14135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.847665][T14135] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 668.856818][T14191] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 668.867137][T14191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 668.877670][T14135] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.887188][T14135] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.896301][T14135] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.905680][T14135] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.970848][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 668.988608][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 669.006493][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 669.006528][ T2617] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 669.025475][ T2617] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 669.035192][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 23:44:05 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:05 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) 23:44:05 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:05 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) 23:44:05 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) 23:44:05 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:05 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {0x0}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:05 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) 23:44:05 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {0x0}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:05 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) 23:44:05 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {0x0}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:05 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:44:06 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:44:06 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:06 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:44:06 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) 23:44:06 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r2, 0x0, 0x0) 23:44:06 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:06 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:06 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:44:06 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:06 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0}, 0x0) 23:44:06 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:06 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0}, 0x0) 23:44:07 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) 23:44:07 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:07 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0}, 0x0) 23:44:07 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:07 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) 23:44:07 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) 23:44:07 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:07 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 23:44:07 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:07 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 23:44:08 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2, 0x0, 0x0, 0x20008001}, 0x40) 23:44:08 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 23:44:08 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) 23:44:08 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x40) 23:44:08 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2}, 0x0) 23:44:08 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) 23:44:08 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r10, r9, r8, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:08 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) 23:44:08 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:44:08 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2}, 0x0) 23:44:08 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:44:08 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2}, 0x0) 23:44:09 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2}, 0x0) 23:44:09 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:09 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) 23:44:09 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)="8c", 0x1}], 0x2, &(0x7f0000000180)="896d51a0a63e06247eb7598a0dfb4fc908e6b1031c6ba2ec960d9d42d19c8daaa6ca4d6d3a838d0d28d34d134ae42370de88fb05d958806fe4f5cd4fbef8b242bd70110fc4d3c05cf9cb48ac39cd7b02360bd459c70983609b07532e0d890837ab5f770cb50d91bf858aa7a0c6cd587f2fdd54393aa87d1ea9c0e065be353399db17367a8a7e3989a7b3c9f55d19888104a259f585ba7ab95819d5f053fce72c84b48e37223dbe1d3c73ee9b4c0a3e063202789c846a7426bdc312ebd947169074d226ba6901c9f421be614088f812518a72cf2d12767564e4b5c27eff1a7c525a39738e17d8ef86811677b1c35080ebbda1af", 0xf3, 0x20008001}, 0x40) 23:44:09 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:09 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) 23:44:09 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:09 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) 23:44:09 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:10 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:10 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1}, 0x0) 23:44:10 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:10 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1}, 0x0) 23:44:10 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:10 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) 23:44:10 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:10 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="8c", 0x1}], 0x1}, 0x0) 23:44:10 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:10 executing program 3: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:10 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) 23:44:11 executing program 0: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:44:11 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:11 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:11 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:11 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:11 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:12 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) 23:44:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:12 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:12 executing program 0: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:44:12 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)) 23:44:12 executing program 3: syz_clone(0x0, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:12 executing program 3: syz_clone(0x0, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:13 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) 23:44:13 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) 23:44:13 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00'}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r9, 0xffffffffffffffff, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[0xffffffffffffffff, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, 0xffffffffffffffff, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:13 executing program 0: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, r8, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) 23:44:13 executing program 5: syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:13 executing program 3: syz_clone(0x0, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:13 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) 23:44:13 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, 0x0, 0x0) 23:44:13 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:13 executing program 3: syz_clone(0x44000, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:13 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:14 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) 23:44:14 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) 23:44:14 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@name, 0x10, 0x0}, 0x0) 23:44:15 executing program 1: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00'}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r9, 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, r9, 0xffffffffffffffff, r11, r9, 0xffffffffffffffff, r9, r9], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r9, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[0xffffffffffffffff, r11], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_ext={0x1c, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f00000007c0)='syzkaller\x00', 0x5, 0xb9, &(0x7f0000000bc0)=""/185, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x2, 0xb, 0x3, 0x7fffffff}, 0x10, 0x2527b, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r4, 0x1, 0xffffffffffffffff, r3, r2, r4], 0x0, 0x10, 0x7}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x18) 23:44:15 executing program 3: syz_clone(0x44000, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 0: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r9, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x14, 0x8, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @generic={0x5, 0x1, 0x4, 0x64, 0x2541}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000e80)='GPL\x00', 0x9, 0xb6, &(0x7f0000000ec0)=""/182, 0x41000, 0xe, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x3, 0x8, 0x3, 0xffff}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000001000)=[0xffffffffffffffff, r5, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x90) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r10, 0x0, 0x0) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r8, r8, r11, r10, r8, r12, r10, 0xffffffffffffffff, r10, r10], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r8, r12], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) 23:44:15 executing program 5: syz_clone(0x0, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 4: syz_clone(0x44000, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 4: syz_clone(0x44000, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 4: syz_clone(0x44000, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 5: syz_clone(0x0, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:15 executing program 3: syz_clone(0x44000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") 23:44:16 executing program 2: r0 = syz_clone(0x44000, &(0x7f00000000c0)="24deb38cd0837f766eb34beb08b4acfcb95031882cc5972c10a3bb5a0b34d45210861f2943f22f4b81625ce3ba893ba321b6beb50bf52411675e4d0318b37624c524a36035d59f1fffd98374fcc558e50c2960e5766da4bebb1ad7ec3a56eb95842484e452556fab94144d0f5ab5e72f0706016d96bd960267f10dd580be074848a0ae1ce8d23b8161aabad84b8a3c7a6962bd075a46e087602514f2df67a3f6dcb0038ebaa4c5bc7b64e259550dd8ecb5488ddb332f30083d311f5251fb6237e1a405d704b97336f35ec78299aee702058c56379f933b07ab", 0xd9, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") socketpair(0x27, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r2}, 0x18) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$tipc(r3, 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0xfff, 0x18}, 0xc) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008, r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x6, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x3, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x0, 0x2, 0x1f, 0x80000001}, @ldst={0x1, 0x1, 0x0, 0x9, 0xb, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000480)=""/224, 0x41000, 0x20, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000580)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0xf, 0xffff, 0x1ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[r2, r2, r4, r3, r2, r5, r3, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0x6}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2, &(0x7f0000000800)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000840)='syzkaller\x00', 0x80000000, 0x8d, &(0x7f0000000880)=""/141, 0x40f00, 0x7165212b0cd481cf, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000940)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xc, 0x40, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[r2, r5], &(0x7f0000000a00)=[{0x0, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x5}, {0x3, 0x3, 0x5}, {0x5, 0x5, 0xd, 0x1}], 0x10, 0x5}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b40)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r3}) ioctl$TUNGETVNETBE(r3, 0x800454df, &(0x7f0000001100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r3, 0x0, 0x7, &(0x7f0000000240)=',#&{%#\x00'}, 0x30) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r7}, 0x18) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000dc0)={r3}, 0x8) openat$cgroup_ro(r8, &(0x7f0000000e00)='memory.events\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@o_path={&(0x7f0000000640)='./file0\x00', 0x0, 0xc008}, 0x18) 23:44:16 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000380)="f12685658c862b234addbd481172db6e7bae994c1d68069369f6d50de581a0881055b1a30f344febcc79cdea4bc7c412b819c1019fc77e0100000017fe65207dd06674598995e3d52dda667d0615be13a2c08c61535b23a94e1f509c553f56d160ff1e2b6d7762eec359a7635c3aebb9bf4c1ad771325f3b11d978b8a12cbe441b5278cbe0fba49ee0d39813e639d2317afc9fd6c360f7893681883f070eb9815d46890b0d717834652c8c6e66b984c9b1cac3e7d8a879cf4ff7a97fea") [ 685.654029][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.661055][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 747.093891][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.101119][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 785.011901][T14120] Bluetooth: hci1: command 0x0406 tx timeout [ 808.524924][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.531229][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 840.521908][ T27] INFO: task syz-executor.1:3528 blocked for more than 143 seconds. [ 840.530388][ T27] Not tainted 5.15.131-syzkaller #0 [ 840.549281][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 840.611742][ T27] task:syz-executor.1 state:D stack:20984 pid: 3528 ppid: 1 flags:0x00004006 [ 840.621293][ T27] Call Trace: [ 840.633335][ T27] [ 840.636310][ T27] __schedule+0x12c4/0x4590 [ 840.640875][ T27] ? __sched_text_start+0x8/0x8 [ 840.653913][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 840.659949][ T27] ? print_irqtrace_events+0x210/0x210 [ 840.676208][ T27] ? _raw_spin_lock_irq+0xdb/0x110 [ 840.726158][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 840.737552][ T27] schedule+0x11b/0x1f0 [ 840.754121][ T27] rwsem_down_write_slowpath+0xebb/0x15c0 [ 840.788057][ T27] ? clear_nonspinnable+0x60/0x60 [ 840.793970][ T27] ? read_lock_is_recursive+0x10/0x10 [ 840.828281][ T27] ? end_current_label_crit_section+0x147/0x170 [ 840.836435][ T27] down_write+0x164/0x170 [ 840.840800][ T27] ? down_read_killable+0x350/0x350 [ 840.878182][ T27] ? may_delete+0x560/0x700 [ 840.898214][ T27] vfs_unlink+0xe0/0x5f0 [ 840.905050][ T27] do_unlinkat+0x49d/0x940 [ 840.909601][ T27] ? fsnotify_link_count+0xf0/0xf0 [ 840.939363][ T27] ? strncpy_from_user+0x209/0x370 [ 840.950320][ T27] __x64_sys_unlink+0x45/0x50 [ 840.977251][ T27] do_syscall_64+0x3d/0xb0 [ 840.997186][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 841.017629][ T27] RIP: 0033:0x7f8152c0a297 [ 841.025506][ T27] RSP: 002b:00007ffc760fcfb8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 841.058142][ T27] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8152c0a297 [ 841.067404][ T27] RDX: 00007ffc760fcfe0 RSI: 00007ffc760fd070 RDI: 00007ffc760fd070 [ 841.102973][ T27] RBP: 00007ffc760fd070 R08: 0000000000000000 R09: 0000000000000000 [ 841.111628][ T27] R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffc760fe130 [ 841.133919][ T27] R13: 00007f8152c553b9 R14: 00000000000a58fa R15: 000000000000001c [ 841.158765][ T27] [ 841.171459][ T27] INFO: task syz-executor.0:14418 blocked for more than 144 seconds. [ 841.191725][ T27] Not tainted 5.15.131-syzkaller #0 [ 841.198592][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 841.211917][ T27] task:syz-executor.0 state:D stack:22552 pid:14418 ppid: 3522 flags:0x00004002 [ 841.221165][ T27] Call Trace: [ 841.230681][ T27] [ 841.241448][ T27] __schedule+0x12c4/0x4590 [ 841.272300][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 841.278524][ T27] ? print_irqtrace_events+0x210/0x210 [ 841.292590][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 841.312034][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 841.318067][ T27] ? __sched_text_start+0x8/0x8 [ 841.344202][ T27] ? __might_sleep+0xc0/0xc0 [ 841.353152][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 841.358825][ T27] schedule+0x11b/0x1f0 [ 841.371775][ T27] wb_wait_for_completion+0x164/0x290 [ 841.377434][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 841.399308][ T27] ? init_wait_entry+0xd0/0xd0 [ 841.422936][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 841.428535][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 841.458823][ T27] ? down_read_trylock+0x24a/0x3b0 [ 841.480735][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 841.531767][ T27] ? cpumask_next+0xc3/0xf0 [ 841.536315][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 841.541624][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 841.557695][ T27] ext4_da_write_begin+0x228/0xb60 [ 841.568903][ T27] ? jbd2_journal_start_reserved+0x300/0x300 [ 841.595068][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 841.616236][ T27] ? rcu_is_watching+0x11/0xa0 [ 841.621521][ T27] ? __mark_inode_dirty+0x3dd/0xd60 [ 841.638674][ T27] generic_perform_write+0x2bf/0x5b0 [ 841.670462][ T27] ? __mnt_drop_write_file+0xbe/0xf0 [ 841.685701][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 841.699704][ T27] ? ext4_write_checks+0x255/0x2c0 [ 841.719226][ T27] ext4_buffered_write_iter+0x227/0x360 [ 841.737436][ T27] ext4_file_write_iter+0x87c/0x1990 [ 841.762198][ T27] ? _raw_spin_unlock+0x24/0x40 [ 841.767514][ T27] ? follow_page_pte+0xad5/0xb60 [ 841.804411][ T27] ? follow_page_mask+0xb59/0x13f0 [ 841.809599][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 841.830617][ T27] ? follow_page+0x130/0x130 [ 841.850103][ T27] ? find_vma+0xd3/0x230 [ 841.861431][ T27] ? check_vma_flags+0x407/0x490 [ 841.876237][ T27] ? iov_iter_kvec+0x4a/0x170 [ 841.880970][ T27] __kernel_write+0x5b1/0xa60 [ 841.927468][ T27] ? vfs_read+0xe10/0xe10 [ 841.948977][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 841.968808][ T27] ? down_read_killable+0x1d2/0x350 [ 841.991785][ T27] __dump_emit+0x264/0x3a0 [ 841.996253][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 842.009273][ T27] ? dump_emit+0x152/0x3f0 [ 842.024982][ T27] dump_user_range+0x91/0x320 [ 842.036817][ T27] elf_core_dump+0x3c7d/0x4570 [ 842.061785][ T27] ? reacquire_held_locks+0x660/0x660 [ 842.079289][ T27] ? load_elf_library+0xa40/0xa40 [ 842.091899][ T27] ? mark_lock+0x98/0x340 [ 842.096385][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 842.109534][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 842.119161][ T27] ? kmem_cache_alloc+0x128/0x280 [ 842.148865][ T27] do_coredump+0x1852/0x31e0 [ 842.157880][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 842.171354][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 842.188128][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 842.217931][ T27] ? get_signal+0x8ac/0x14e0 [ 842.258283][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 842.278273][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 842.286559][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 842.309440][ T27] get_signal+0xc06/0x14e0 [ 842.321530][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 842.330385][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 842.358539][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 842.365717][ T27] ? _raw_spin_unlock+0x40/0x40 [ 842.371542][ T27] ? get_sigframe_size+0x10/0x10 [ 842.401843][ T27] ? force_sig_info_to_task+0x34a/0x470 [ 842.407452][ T27] ? force_sig+0x114/0x1d0 [ 842.423997][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 842.453977][ T27] exit_to_user_mode_loop+0x97/0x130 [ 842.459824][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 842.473700][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 842.479309][ T27] exc_general_protection+0x358/0x4f0 [ 842.490597][ T27] ? vtime_user_enter+0x1ee/0x2d0 [ 842.497415][ T27] ? __context_tracking_enter+0x5f/0x90 [ 842.503852][ T27] asm_exc_general_protection+0x22/0x30 [ 842.509688][ T27] RIP: 0033:0x7f6df4774af1 [ 842.514648][ T27] RSP: 002b:0000000020000190 EFLAGS: 00010217 [ 842.520826][ T27] RAX: 0000000000000000 RBX: 00007f6df4893f80 RCX: 00007f6df4774ae9 [ 842.542558][ T27] RDX: 00000000200001c0 RSI: 0000000020000190 RDI: 0000000000044000 [ 842.585369][ T27] RBP: 00007f6df47c047a R08: 0000000020000380 R09: 0000000020000380 [ 842.619130][ T27] R10: 0000000020000200 R11: 0000000000000206 R12: 0000000000000000 [ 842.651718][ T27] R13: 000000000000000b R14: 00007f6df4893f80 R15: 00007ffeb2051bc8 [ 842.659838][ T27] [ 842.670775][ T27] INFO: task syz-executor.1:14478 blocked for more than 145 seconds. [ 842.691440][ T27] Not tainted 5.15.131-syzkaller #0 [ 842.703384][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 842.725033][ T27] task:syz-executor.1 state:D stack:23200 pid:14478 ppid: 3528 flags:0x00004002 [ 842.758216][ T27] Call Trace: [ 842.761602][ T27] [ 842.766174][ T27] __schedule+0x12c4/0x4590 [ 842.770715][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 842.788192][ T27] ? print_irqtrace_events+0x210/0x210 [ 842.804120][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 842.809374][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 842.846224][ T27] ? __sched_text_start+0x8/0x8 [ 842.851211][ T27] ? __might_sleep+0xc0/0xc0 [ 842.876324][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 842.918594][ T27] schedule+0x11b/0x1f0 [ 842.923464][ T27] wb_wait_for_completion+0x164/0x290 [ 842.928925][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 842.951726][ T27] ? init_wait_entry+0xd0/0xd0 [ 842.956573][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 842.967487][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 842.975517][ T27] ? down_read_trylock+0x24a/0x3b0 [ 842.988665][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 843.021273][ T27] ? ktime_get_coarse_real_ts64+0x36/0x120 [ 843.039936][ T27] ? cpumask_next+0xc3/0xf0 [ 843.058350][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 843.064057][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 843.069629][ T27] ext4_da_write_begin+0x228/0xb60 [ 843.099823][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 843.105517][ T27] ? current_time+0x1af/0x2f0 [ 843.110306][ T27] ? atime_needs_update+0x7b0/0x7b0 [ 843.123236][ T27] generic_perform_write+0x2bf/0x5b0 [ 843.128587][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 843.160178][ T27] ? ext4_write_checks+0x255/0x2c0 [ 843.191764][ T27] ext4_buffered_write_iter+0x227/0x360 [ 843.197370][ T27] ext4_file_write_iter+0x87c/0x1990 [ 843.211788][ T27] ? _raw_spin_unlock+0x24/0x40 [ 843.222124][ T27] ? follow_page_pte+0xad5/0xb60 [ 843.227200][ T27] ? follow_page_mask+0xb59/0x13f0 [ 843.249946][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 843.256764][ T27] ? follow_page+0x130/0x130 [ 843.261455][ T27] ? find_vma+0xd3/0x230 [ 843.268261][ T27] ? check_vma_flags+0x407/0x490 [ 843.281113][ T27] ? iov_iter_kvec+0x4a/0x170 [ 843.291821][ T27] __kernel_write+0x5b1/0xa60 [ 843.321741][ T27] ? vfs_read+0xe10/0xe10 [ 843.326112][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 843.331168][ T27] ? down_read_killable+0x1d2/0x350 [ 843.383459][ T27] __dump_emit+0x264/0x3a0 [ 843.387929][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 843.421731][ T27] ? dump_emit+0x152/0x3f0 [ 843.426200][ T27] dump_user_range+0x91/0x320 [ 843.430893][ T27] elf_core_dump+0x3c7d/0x4570 [ 843.451748][ T27] ? reacquire_held_locks+0x660/0x660 [ 843.457207][ T27] ? load_elf_library+0xa40/0xa40 [ 843.491723][ T27] ? mark_lock+0x98/0x340 [ 843.496109][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 843.501185][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 843.532878][ T27] ? kmem_cache_alloc+0x128/0x280 [ 843.537960][ T27] do_coredump+0x1852/0x31e0 [ 843.580083][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 843.585493][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 843.591080][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 843.621755][ T27] ? get_signal+0x8ac/0x14e0 [ 843.626481][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 843.651782][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 843.657030][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 843.663097][ T27] get_signal+0xc06/0x14e0 [ 843.667579][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 843.701841][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 843.707097][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 843.721724][ T27] ? _raw_spin_unlock+0x40/0x40 [ 843.726630][ T27] ? get_sigframe_size+0x10/0x10 [ 843.731582][ T27] ? force_sig_info_to_task+0x34a/0x470 [ 843.761832][ T27] ? force_sig+0x114/0x1d0 [ 843.767208][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 843.791737][ T27] exit_to_user_mode_loop+0x97/0x130 [ 843.797070][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 843.811738][ T27] irqentry_exit_to_user_mode+0x5/0x40 [ 843.817244][ T27] exc_general_protection+0x358/0x4f0 [ 843.834375][ T27] ? vtime_user_enter+0x1ee/0x2d0 [ 843.839446][ T27] ? __context_tracking_enter+0x5f/0x90 [ 843.881737][ T27] asm_exc_general_protection+0x22/0x30 [ 843.887353][ T27] RIP: 0033:0x7f8152c0aaf1 [ 843.892311][ T27] RSP: 002b:0000000020000190 EFLAGS: 00010217 [ 843.898393][ T27] RAX: 0000000000000000 RBX: 00007f8152d29f80 RCX: 00007f8152c0aae9 [ 843.931762][ T27] RDX: 00000000200001c0 RSI: 0000000020000190 RDI: 0000000000044000 [ 843.939854][ T27] RBP: 00007f8152c5647a R08: 0000000020000380 R09: 0000000020000380 [ 843.950810][ T27] R10: 0000000020000200 R11: 0000000000000206 R12: 0000000000000000 [ 843.991721][ T27] R13: 000000000000000b R14: 00007f8152d29f80 R15: 00007ffc760fdd98 [ 843.999746][ T27] [ 844.011781][ T27] [ 844.011781][ T27] Showing all locks held in the system: [ 844.019632][ T27] 1 lock held by khungtaskd/27: [ 844.038545][ T27] #0: ffffffff8c91f0e0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 844.063450][ T27] 3 locks held by kworker/u4:4/1129: [ 844.068847][ T27] #0: ffff8880b9b39718 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 844.101807][ T27] #1: ffff8880b9b27848 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x53d/0x810 [ 844.131811][ T27] #2: ffff88805a7c4d18 (&bat_priv->forw_bat_list_lock){+...}-{2:2}, at: batadv_forw_packet_steal+0x2b/0x160 [ 844.158459][ T27] 4 locks held by kworker/u4:6/2617: [ 844.171120][ T27] #0: ffff888142fc4938 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 844.195530][ T27] #1: ffffc9000af97d20 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 844.241737][ T27] #2: ffff88814af86bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 844.260836][ T27] #3: ffff88814af88990 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0x12d5/0x1590 [ 844.275428][ T27] 2 locks held by getty/3264: [ 844.280955][ T27] #0: ffff8880246af098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 844.315334][ T27] #1: ffffc90002bb32e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 844.330976][ T27] 3 locks held by syz-executor.1/3528: [ 844.342014][ T27] #0: ffff88814af84460 (sb_writers#5){.+.+}-{0:0}, at: mnt_want_write+0x3b/0x80 [ 844.351223][ T27] #1: ffff8880375635c8 (&type->i_mutex_dir_key#4/1){+.+.}-{3:3}, at: do_unlinkat+0x260/0x940 [ 844.383804][ T27] #2: ffff8880374783f0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: vfs_unlink+0xe0/0x5f0 [ 844.421746][ T27] 1 lock held by syz-executor.5/14363: [ 844.427236][ T27] 3 locks held by syz-executor.2/14375: [ 844.451825][ T27] 1 lock held by syz-executor.5/14400: [ 844.460093][ T27] 2 locks held by syz-executor.3/14403: [ 844.501730][ T27] 2 locks held by syz-executor.2/14410: [ 844.507312][ T27] 3 locks held by syz-executor.0/14418: [ 844.529121][ T27] #0: ffff88814af84460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 844.553746][ T27] #1: ffff888050f3abd0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 844.591728][ T27] #2: ffff88814af840e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 844.621733][ T27] 2 locks held by syz-executor.5/14426: [ 844.627306][ T27] 3 locks held by syz-executor.3/14432: [ 844.662421][ T27] 1 lock held by syz-executor.2/14435: [ 844.667913][ T27] 2 locks held by syz-executor.3/14446: [ 844.684667][ T27] 2 locks held by syz-executor.3/14460: [ 844.691052][ T27] 1 lock held by syz-executor.2/14476: [ 844.721026][ T27] 3 locks held by syz-executor.1/14478: [ 844.741726][ T27] #0: ffff88814af84460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 844.751018][ T27] #1: ffff8880374783f0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 844.787907][ T27] #2: ffff88814af840e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 844.821785][ T27] 2 locks held by syz-executor.5/14479: [ 844.827363][ T27] 2 locks held by syz-executor.5/14499: [ 844.844188][ T27] 1 lock held by syz-executor.2/14502: [ 844.849783][ T27] 1 lock held by syz-executor.5/14519: [ 844.882959][ T27] [ 844.885412][ T27] ============================================= [ 844.885412][ T27] [ 844.908042][ T27] NMI backtrace for cpu 0 [ 844.912401][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.131-syzkaller #0 [ 844.920393][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 844.930463][ T27] Call Trace: [ 844.933755][ T27] [ 844.936688][ T27] dump_stack_lvl+0x1e3/0x2cb [ 844.941383][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 844.947112][ T27] ? panic+0x84d/0x84d [ 844.951197][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 844.956328][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 844.961273][ T27] ? __wake_up_klogd+0xd5/0x100 [ 844.966164][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 844.972416][ T27] ? _printk+0xd1/0x111 [ 844.976578][ T27] ? panic+0x84d/0x84d [ 844.980651][ T27] ? __wake_up_klogd+0xcc/0x100 [ 844.985537][ T27] ? panic+0x84d/0x84d [ 844.989665][ T27] ? __rcu_read_unlock+0x92/0x100 [ 844.994699][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 845.000849][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 845.006856][ T27] watchdog+0xe72/0xeb0 [ 845.011085][ T27] kthread+0x3f6/0x4f0 [ 845.015170][ T27] ? hungtask_pm_notify+0x50/0x50 [ 845.020204][ T27] ? kthread_blkcg+0xd0/0xd0 [ 845.024805][ T27] ret_from_fork+0x1f/0x30 [ 845.029309][ T27] [ 845.033130][ T27] Sending NMI from CPU 0 to CPUs 1: [ 845.038345][ C1] NMI backtrace for cpu 1 [ 845.038357][ C1] CPU: 1 PID: 14519 Comm: syz-executor.5 Not tainted 5.15.131-syzkaller #0 [ 845.038374][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 845.038383][ C1] RIP: 0010:lock_is_held_type+0xab/0x180 [ 845.038404][ C1] Code: 0a 00 00 00 7e 47 4c 89 ed 48 81 c5 f0 0a 00 00 31 db 48 83 fb 31 73 24 48 89 ef 4c 89 fe e8 fc 01 00 00 85 c0 75 2a 48 ff c3 <49> 63 85 e8 0a 00 00 48 83 c5 28 48 39 c3 7c d8 eb 11 48 c7 c7 80 [ 845.038416][ C1] RSP: 0018:ffffc90005946ca8 EFLAGS: 00000002 [ 845.038430][ C1] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000080000000 [ 845.038439][ C1] RDX: ffff88807d4fbb80 RSI: ffffffff8c91f0e0 RDI: ffff88807d4fc698 [ 845.038450][ C1] RBP: ffff88807d4fc698 R08: ffffffff842e115d R09: fffff94000254d67 [ 845.038461][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000246 [ 845.038470][ C1] R13: ffff88807d4fbb80 R14: 00000000ffffffff R15: ffffffff8c91f0e0 [ 845.038481][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 845.038493][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 845.038504][ C1] CR2: 000000c0006d5fc0 CR3: 00000000196c3000 CR4: 00000000003506e0 [ 845.038517][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 845.038524][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 845.038533][ C1] Call Trace: [ 845.038538][ C1] [ 845.038544][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 845.038562][ C1] ? read_lock_is_recursive+0x10/0x10 [ 845.038582][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 845.038603][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 845.038618][ C1] ? nmi_handle+0xf7/0x370 [ 845.038634][ C1] ? lock_is_held_type+0xab/0x180 [ 845.038646][ C1] ? default_do_nmi+0x62/0x150 [ 845.038659][ C1] ? exc_nmi+0xab/0x120 [ 845.038671][ C1] ? end_repeat_nmi+0x16/0x31 [ 845.038688][ C1] ? xas_find_marked+0x78d/0x10e0 [ 845.038704][ C1] ? lock_is_held_type+0xab/0x180 [ 845.038717][ C1] ? lock_is_held_type+0xab/0x180 [ 845.038731][ C1] ? lock_is_held_type+0xab/0x180 [ 845.038744][ C1] [ 845.038748][ C1] [ 845.038754][ C1] xas_find_marked+0x7b8/0x10e0 [ 845.038772][ C1] find_get_entry+0x6f/0x280 [ 845.038789][ C1] find_get_pages_range_tag+0x241/0x500 [ 845.038806][ C1] ? xas_reload+0x470/0x470 [ 845.038820][ C1] ? __might_sleep+0xc0/0xc0 [ 845.038835][ C1] ? mpage_process_page_bufs+0x6f6/0x8b0 [ 845.038854][ C1] pagevec_lookup_range_tag+0x37/0x80 [ 845.038925][ C1] mpage_prepare_extent_to_map+0x399/0x1150 [ 845.038949][ C1] ? trace_ext4_writepages+0x1e0/0x1e0 [ 845.038970][ C1] ? __ext4_journal_start_sb+0x175/0x370 [ 845.039006][ C1] ext4_writepages+0x1273/0x3d10 [ 845.039036][ C1] ? ext4_readpage+0x300/0x300 [ 845.039060][ C1] ? __lock_acquire+0x1295/0x1ff0 [ 845.039079][ C1] ? ext4_readpage+0x300/0x300 [ 845.039095][ C1] do_writepages+0x481/0x730 [ 845.039109][ C1] ? __writepage+0x120/0x120 [ 845.039121][ C1] ? read_lock_is_recursive+0x10/0x10 [ 845.039137][ C1] ? filemap_fdatawrite_wbc+0x1cb/0x230 [ 845.039151][ C1] ? __lock_acquire+0x1ff0/0x1ff0 [ 845.039166][ C1] ? do_raw_spin_lock+0x14a/0x370 [ 845.039182][ C1] ? do_raw_spin_unlock+0x137/0x8b0 [ 845.039196][ C1] ? wbc_attach_and_unlock_inode+0x5e8/0x600 [ 845.039216][ C1] filemap_fdatawrite_wbc+0x1d6/0x230 [ 845.039231][ C1] filemap_flush+0x10c/0x150 [ 845.039244][ C1] ? ima_file_free+0x10f/0x3c0 [ 845.039283][ C1] ? filemap_fdatawrite_range+0x1b0/0x1b0 [ 845.039297][ C1] ? __mutex_unlock_slowpath+0x218/0x750 [ 845.039314][ C1] ? rcu_is_watching+0x11/0xa0 [ 845.039330][ C1] ext4_release_file+0x7d/0x300 [ 845.039342][ C1] ? ext4_file_open+0x710/0x710 [ 845.039355][ C1] __fput+0x3bf/0x890 [ 845.039375][ C1] task_work_run+0x129/0x1a0 [ 845.039393][ C1] do_exit+0x6a3/0x2480 [ 845.039411][ C1] ? put_task_struct+0x80/0x80 [ 845.039428][ C1] ? get_signal+0x8ac/0x14e0 [ 845.039445][ C1] do_group_exit+0x144/0x310 [ 845.039461][ C1] ? lockdep_hardirqs_on+0x94/0x130 [ 845.039475][ C1] get_signal+0xc66/0x14e0 [ 845.039496][ C1] arch_do_signal_or_restart+0xc3/0x1890 [ 845.039515][ C1] ? lockdep_hardirqs_on+0x94/0x130 [ 845.039528][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 845.039543][ C1] ? _raw_spin_unlock+0x40/0x40 [ 845.039559][ C1] ? get_sigframe_size+0x10/0x10 [ 845.039574][ C1] ? force_sig_info_to_task+0x34a/0x470 [ 845.039593][ C1] ? force_sig+0x114/0x1d0 [ 845.039609][ C1] ? exit_to_user_mode_loop+0x39/0x130 [ 845.039624][ C1] exit_to_user_mode_loop+0x97/0x130 [ 845.039638][ C1] exit_to_user_mode_prepare+0xb1/0x140 [ 845.039652][ C1] irqentry_exit_to_user_mode+0x5/0x40 [ 845.039665][ C1] exc_general_protection+0x358/0x4f0 [ 845.039683][ C1] ? vtime_user_enter+0x1ee/0x2d0 [ 845.039697][ C1] ? __context_tracking_enter+0x5f/0x90 [ 845.039717][ C1] asm_exc_general_protection+0x22/0x30 [ 845.039732][ C1] RIP: 0033:0x7f4278264af1 [ 845.039744][ C1] Code: Unable to access opcode bytes at RIP 0x7f4278264ac7. [ 845.039750][ C1] RSP: 002b:0000000020000190 EFLAGS: 00010217 [ 845.039761][ C1] RAX: 0000000000000000 RBX: 00007f4278383f80 RCX: 00007f4278264ae9 [ 845.039771][ C1] RDX: 00000000200001c0 RSI: 0000000020000190 RDI: 0000000000000000 [ 845.039780][ C1] RBP: 00007f42782b047a R08: 0000000020000380 R09: 0000000020000380 [ 845.039789][ C1] R10: 0000000020000200 R11: 0000000000000246 R12: 0000000000000000 [ 845.039798][ C1] R13: 000000000000000b R14: 00007f4278383f80 R15: 00007ffdd2b4dd78 [ 845.039813][ C1] [ 845.073482][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 845.596286][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.131-syzkaller #0 [ 845.604290][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 845.614984][ T27] Call Trace: [ 845.618270][ T27] [ 845.621470][ T27] dump_stack_lvl+0x1e3/0x2cb [ 845.626176][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 845.632028][ T27] ? panic+0x84d/0x84d [ 845.636207][ T27] panic+0x318/0x84d [ 845.640112][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 845.645850][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 845.652030][ T27] ? fb_is_primary_device+0xcc/0xcc [ 845.657295][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 845.663386][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 845.669558][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 845.675746][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 845.681919][ T27] watchdog+0xeb0/0xeb0 [ 845.686093][ T27] kthread+0x3f6/0x4f0 [ 845.690169][ T27] ? hungtask_pm_notify+0x50/0x50 [ 845.695208][ T27] ? kthread_blkcg+0xd0/0xd0 [ 845.699805][ T27] ret_from_fork+0x1f/0x30 [ 845.704240][ T27] [ 845.707450][ T27] Kernel Offset: disabled [ 845.711767][ T27] Rebooting in 86400 seconds..