&(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:21 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x89, 0x0, 0xb1, 0x1f, 0x0, 0x0, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000000), 0xa}, 0x8540, 0x400, 0xa1, 0x9, 0x80, 0x0, 0x0, 0x0, 0xffffffc1, 0x0, 0x100000000}, r1, 0x7, r0, 0x1) openat$cgroup_ro(r1, &(0x7f0000000100)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) (async) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x89, 0x0, 0xb1, 0x1f, 0x0, 0x0, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000000), 0xa}, 0x8540, 0x400, 0xa1, 0x9, 0x80, 0x0, 0x0, 0x0, 0xffffffc1, 0x0, 0x100000000}, r1, 0x7, r0, 0x1) (async) openat$cgroup_ro(r1, &(0x7f0000000100)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) (async) 02:27:21 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x89, 0x0, 0xb1, 0x1f, 0x0, 0x0, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000000), 0xa}, 0x8540, 0x400, 0xa1, 0x9, 0x80, 0x0, 0x0, 0x0, 0xffffffc1, 0x0, 0x100000000}, r1, 0x7, r0, 0x1) (async) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x89, 0x0, 0xb1, 0x1f, 0x0, 0x0, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000000), 0xa}, 0x8540, 0x400, 0xa1, 0x9, 0x80, 0x0, 0x0, 0x0, 0xffffffc1, 0x0, 0x100000000}, r1, 0x7, r0, 0x1) openat$cgroup_ro(r1, &(0x7f0000000100)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) 02:27:21 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:21 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f00000011c0)=@generic={&(0x7f0000001180)='./file0\x00'}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001140)={r0, 0x20, &(0x7f0000001100)={&(0x7f0000000040)=""/4096, 0x1000, 0x0, &(0x7f0000001040)=""/134, 0x86}}, 0x10) 02:27:21 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f00000011c0)=@generic={&(0x7f0000001180)='./file0\x00'}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001140)={r0, 0x20, &(0x7f0000001100)={&(0x7f0000000040)=""/4096, 0x1000, 0x0, &(0x7f0000001040)=""/134, 0x86}}, 0x10) 02:27:22 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f00000011c0)=@generic={&(0x7f0000001180)='./file0\x00'}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001140)={r0, 0x20, &(0x7f0000001100)={&(0x7f0000000040)=""/4096, 0x1000, 0x0, &(0x7f0000001040)=""/134, 0x86}}, 0x10) 02:27:22 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="09e3ac8a731eeafc76ab0dee93f6faea1eb023f3c3284ef468592a789e0d2580050000008e473948862976933707c0f7ee3571616eb7bb3969a1c7724978750b64ecd7681f0761a95e081703123e1c27382b53c296c14dcafe461e2cf622bde5e56571003da4c1cb876ae32e5c3c61194afba10f08c2f703de75c83096c6562183c3d0f47da934fdc9c8f8172724175a267786060a72cc3e62681f559db21901a85ecfb56e16f0497a5e7712144e4d06ed293326363e071b81ba94c8e48ea5eb1c8faef0cf95d6866878b16596934cb8bc"]) 02:27:22 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="09e3ac8a731eeafc76ab0dee93f6faea1eb023f3c3284ef468592a789e0d2580050000008e473948862976933707c0f7ee3571616eb7bb3969a1c7724978750b64ecd7681f0761a95e081703123e1c27382b53c296c14dcafe461e2cf622bde5e56571003da4c1cb876ae32e5c3c61194afba10f08c2f703de75c83096c6562183c3d0f47da934fdc9c8f8172724175a267786060a72cc3e62681f559db21901a85ecfb56e16f0497a5e7712144e4d06ed293326363e071b81ba94c8e48ea5eb1c8faef0cf95d6866878b16596934cb8bc"]) 02:27:22 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:22 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="09e3ac8a731eeafc76ab0dee93f6faea1eb023f3c3284ef468592a789e0d2580050000008e473948862976933707c0f7ee3571616eb7bb3969a1c7724978750b64ecd7681f0761a95e081703123e1c27382b53c296c14dcafe461e2cf622bde5e56571003da4c1cb876ae32e5c3c61194afba10f08c2f703de75c83096c6562183c3d0f47da934fdc9c8f8172724175a267786060a72cc3e62681f559db21901a85ecfb56e16f0497a5e7712144e4d06ed293326363e071b81ba94c8e48ea5eb1c8faef0cf95d6866878b16596934cb8bc"]) 02:27:22 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:22 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:22 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:22 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x16, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ed, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0x9}, @exit, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x3}, @ldst={0x3, 0x2, 0x0, 0x8, 0x9, 0x20}, @tail_call]}, &(0x7f00000001c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x7, 0x9, 0xcabb}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f0000000280)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f00000002c0)=[{0x2, 0x2, 0xa, 0x7}, {0x3, 0x4, 0x2, 0x5}, {0x5, 0x5, 0x10, 0x8}, {0x0, 0x4, 0xd, 0x2}, {0x0, 0x2, 0x10, 0x7}], 0x10, 0x45572531}, 0x90) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=0x1, 0x31, 0x0, 0x9, &(0x7f0000000480)=[0x0], 0x1, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={@map, r1, 0x7, 0x34, 0xffffffffffffffff, @prog_fd=r2, r3}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x4, 0x80, 0x9, 0x1, 0xa0, 0x3f, 0x0, 0x9, 0xa000, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x8062, 0x2, 0x28000, 0x0, 0x400, 0x2, 0xfff, 0x0, 0x7fff, 0x0, 0x5}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000600), 0x2, 0x0) 02:27:22 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x16, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ed, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0x9}, @exit, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x3}, @ldst={0x3, 0x2, 0x0, 0x8, 0x9, 0x20}, @tail_call]}, &(0x7f00000001c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x7, 0x9, 0xcabb}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f0000000280)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f00000002c0)=[{0x2, 0x2, 0xa, 0x7}, {0x3, 0x4, 0x2, 0x5}, {0x5, 0x5, 0x10, 0x8}, {0x0, 0x4, 0xd, 0x2}, {0x0, 0x2, 0x10, 0x7}], 0x10, 0x45572531}, 0x90) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=0x1, 0x31, 0x0, 0x9, &(0x7f0000000480)=[0x0], 0x1, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={@map, r1, 0x7, 0x34, 0xffffffffffffffff, @prog_fd=r2, r3}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x4, 0x80, 0x9, 0x1, 0xa0, 0x3f, 0x0, 0x9, 0xa000, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x8062, 0x2, 0x28000, 0x0, 0x400, 0x2, 0xfff, 0x0, 0x7fff, 0x0, 0x5}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000600), 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x16, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ed, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0x9}, @exit, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x3}, @ldst={0x3, 0x2, 0x0, 0x8, 0x9, 0x20}, @tail_call]}, &(0x7f00000001c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x7, 0x9, 0xcabb}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f0000000280)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f00000002c0)=[{0x2, 0x2, 0xa, 0x7}, {0x3, 0x4, 0x2, 0x5}, {0x5, 0x5, 0x10, 0x8}, {0x0, 0x4, 0xd, 0x2}, {0x0, 0x2, 0x10, 0x7}], 0x10, 0x45572531}, 0x90) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=0x1, 0x31, 0x0, 0x9, &(0x7f0000000480)=[0x0], 0x1, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={@map, r1, 0x7, 0x34, 0xffffffffffffffff, @prog_fd=r2, r3}, 0x20) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x4, 0x80, 0x9, 0x1, 0xa0, 0x3f, 0x0, 0x9, 0xa000, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x8062, 0x2, 0x28000, 0x0, 0x400, 0x2, 0xfff, 0x0, 0x7fff, 0x0, 0x5}) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000600), 0x2, 0x0) (async) 02:27:23 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x16, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ed, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0x9}, @exit, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x3}, @ldst={0x3, 0x2, 0x0, 0x8, 0x9, 0x20}, @tail_call]}, &(0x7f00000001c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x7, 0x9, 0xcabb}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f0000000280)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f00000002c0)=[{0x2, 0x2, 0xa, 0x7}, {0x3, 0x4, 0x2, 0x5}, {0x5, 0x5, 0x10, 0x8}, {0x0, 0x4, 0xd, 0x2}, {0x0, 0x2, 0x10, 0x7}], 0x10, 0x45572531}, 0x90) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f0000000400)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=0x1, 0x31, 0x0, 0x9, &(0x7f0000000480)=[0x0], 0x1, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={@map, r1, 0x7, 0x34, 0xffffffffffffffff, @prog_fd=r2, r3}, 0x20) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={@map, r1, 0x7, 0x34, 0xffffffffffffffff, @prog_fd=r2, r3}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x4, 0x80, 0x9, 0x1, 0xa0, 0x3f, 0x0, 0x9, 0xa000, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x8062, 0x2, 0x28000, 0x0, 0x400, 0x2, 0xfff, 0x0, 0x7fff, 0x0, 0x5}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000600), 0x2, 0x0) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000600), 0x2, 0x0) 02:27:23 executing program 1: r0 = gettid() syz_open_procfs$namespace(r0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r1, 0x0, 0x5, &(0x7f0000000040)='-[%\'\x00'}, 0x30) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:23 executing program 1: r0 = gettid() syz_open_procfs$namespace(r0, 0x0) (async) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r1, 0x0, 0x5, &(0x7f0000000040)='-[%\'\x00'}, 0x30) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:23 executing program 1: r0 = gettid() syz_open_procfs$namespace(r0, 0x0) (async) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r1, 0x0, 0x5, &(0x7f0000000040)='-[%\'\x00'}, 0x30) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:23 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) 02:27:23 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) (rerun: 32) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) [ 779.312605][ T1065] Bluetooth: hci5: command 0x0409 tx timeout 02:27:23 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) 02:27:23 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:23 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:24 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) 02:27:24 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:24 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xff, 0x6, 0x3f, 0x6, 0x0, 0x7370, 0x101, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x401, 0x2, @perf_config_ext={0x1000, 0x6}, 0x0, 0xff, 0x8000, 0x5, 0x7, 0x1, 0x4, 0x0, 0x8001, 0x0, 0xfffffffffffffffd}, 0x0, 0xa, r0, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x20, 0x3, 0x7e, 0x1f, 0x0, 0x1f, 0x80, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xef58, 0x1, @perf_config_ext={0xfffffffffffffff9, 0x7}, 0x800, 0x0, 0x5, 0xe, 0x800, 0x51d, 0x80, 0x0, 0x4}, r1, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x1f, 0x2, 0x7f, 0x2, 0x0, 0x631, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffff1d2, 0x4, @perf_bp, 0x90077, 0x7, 0x9, 0x7, 0x3bdb, 0x80, 0x2, 0x0, 0x8, 0x0, 0x49aa}, r1, 0xd, r2, 0x2) 02:27:24 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) gettid() (async) r1 = gettid() r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xff, 0x6, 0x3f, 0x6, 0x0, 0x7370, 0x101, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x401, 0x2, @perf_config_ext={0x1000, 0x6}, 0x0, 0xff, 0x8000, 0x5, 0x7, 0x1, 0x4, 0x0, 0x8001, 0x0, 0xfffffffffffffffd}, 0x0, 0xa, r0, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x20, 0x3, 0x7e, 0x1f, 0x0, 0x1f, 0x80, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xef58, 0x1, @perf_config_ext={0xfffffffffffffff9, 0x7}, 0x800, 0x0, 0x5, 0xe, 0x800, 0x51d, 0x80, 0x0, 0x4}, r1, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x1f, 0x2, 0x7f, 0x2, 0x0, 0x631, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffff1d2, 0x4, @perf_bp, 0x90077, 0x7, 0x9, 0x7, 0x3bdb, 0x80, 0x2, 0x0, 0x8, 0x0, 0x49aa}, r1, 0xd, r2, 0x2) 02:27:24 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) gettid() (async) r1 = gettid() r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xff, 0x6, 0x3f, 0x6, 0x0, 0x7370, 0x101, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x401, 0x2, @perf_config_ext={0x1000, 0x6}, 0x0, 0xff, 0x8000, 0x5, 0x7, 0x1, 0x4, 0x0, 0x8001, 0x0, 0xfffffffffffffffd}, 0x0, 0xa, r0, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x20, 0x3, 0x7e, 0x1f, 0x0, 0x1f, 0x80, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xef58, 0x1, @perf_config_ext={0xfffffffffffffff9, 0x7}, 0x800, 0x0, 0x5, 0xe, 0x800, 0x51d, 0x80, 0x0, 0x4}, r1, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x1f, 0x2, 0x7f, 0x2, 0x0, 0x631, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffff1d2, 0x4, @perf_bp, 0x90077, 0x7, 0x9, 0x7, 0x3bdb, 0x80, 0x2, 0x0, 0x8, 0x0, 0x49aa}, r1, 0xd, r2, 0x2) 02:27:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000001500)={'erspan0\x00'}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x0, 0x2, [@local, @random="1c6b71c3180c"]}) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000380)=r1) 02:27:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000001500)={'erspan0\x00'}) (async) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x0, 0x2, [@local, @random="1c6b71c3180c"]}) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000380)=r1) [ 780.608090][T20785] chnl_net:caif_netlink_parms(): no params data found 02:27:25 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000001500)={'erspan0\x00'}) (async) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x0, 0x2, [@local, @random="1c6b71c3180c"]}) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000380)=r1) 02:27:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) [ 781.396978][ T1065] Bluetooth: hci5: command 0x041b tx timeout 02:27:25 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) [ 782.263422][T20785] bridge0: port 1(bridge_slave_0) entered blocking state [ 782.292803][T20785] bridge0: port 1(bridge_slave_0) entered disabled state [ 782.301991][T20785] device bridge_slave_0 entered promiscuous mode 02:27:26 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 782.369919][T20785] bridge0: port 2(bridge_slave_1) entered blocking state [ 782.386142][T20785] bridge0: port 2(bridge_slave_1) entered disabled state [ 782.412048][T20785] device bridge_slave_1 entered promiscuous mode 02:27:26 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:27 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) [ 783.473140][ T1065] Bluetooth: hci5: command 0x040f tx timeout 02:27:28 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:28 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:28 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 785.401087][T20785] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 785.543183][ T3568] Bluetooth: hci5: command 0x0419 tx timeout 02:27:30 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:30 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) [ 785.984325][T20785] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:27:30 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:30 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) (async) 02:27:30 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) 02:27:30 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x2d, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc5d}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x5}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x44}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @alu={0x4, 0x1, 0xb, 0x1, 0x8, 0x100, 0x4}, @call={0x85, 0x0, 0x0, 0x26}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x1, 0xe2, &(0x7f00000006c0)=""/226, 0x41100, 0x43, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000a40)={r2, 0x0, 0x6d, 0x0, &(0x7f0000000900)="60f600f2e21f6e9e076cda43a25affedac58c05eccbeb9233302e420bbdc6a1cb03aed2b966ede66b2527cd0fa057caefd33e353250c7639d999735b60007986443045221591b18c9371c36a3843516b6aa8e2d3f5bac5144913b7f418540184f876317c2c0965826d3a017aec", 0x0, 0x20, 0x0, 0xbb, 0x0, &(0x7f0000000980)="00c41fdb525ff83d03ad8c2ef8098dc2047574b7f5d479183871b4eb2f9b882c7bfa2e9cdcee23c92f118b1f91b25b07cfe129801799b328262d6751e99ea03da7e5466dc6ef8a2a9a86a02204ee2db4df1764c818e0878736d32162aa2c897f264a4d2cce76b572cd6a6fd6960ee51f7ca7de47b6e4c9f30a76a4c39e2b37d45f433069c4774a6d9d4004bf148a885e9253200c5c14ba79712b08de930d591649c3cc1d554e30a8815bab25bcb2494a31212a3eed18c2e24a502d", 0x0, 0x2, 0x0, 0x800}, 0x50) perf_event_open$cgroup(&(0x7f0000000b00)={0x0, 0x80, 0x2, 0x6, 0x3, 0x6, 0x0, 0x6, 0x3000, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf37, 0x4, @perf_bp={&(0x7f0000000ac0), 0x2}, 0x0, 0xffffffffffffffff, 0x6, 0x4, 0x401, 0xff, 0x92, 0x0, 0x7, 0x0, 0x5}, r0, 0x8, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000004c0)={@ifindex=r1, 0x1e, 0x1, 0x7fff, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) 02:27:30 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x2d, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc5d}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x5}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x44}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @alu={0x4, 0x1, 0xb, 0x1, 0x8, 0x100, 0x4}, @call={0x85, 0x0, 0x0, 0x26}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x1, 0xe2, &(0x7f00000006c0)=""/226, 0x41100, 0x43, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000a40)={r2, 0x0, 0x6d, 0x0, &(0x7f0000000900)="60f600f2e21f6e9e076cda43a25affedac58c05eccbeb9233302e420bbdc6a1cb03aed2b966ede66b2527cd0fa057caefd33e353250c7639d999735b60007986443045221591b18c9371c36a3843516b6aa8e2d3f5bac5144913b7f418540184f876317c2c0965826d3a017aec", 0x0, 0x20, 0x0, 0xbb, 0x0, &(0x7f0000000980)="00c41fdb525ff83d03ad8c2ef8098dc2047574b7f5d479183871b4eb2f9b882c7bfa2e9cdcee23c92f118b1f91b25b07cfe129801799b328262d6751e99ea03da7e5466dc6ef8a2a9a86a02204ee2db4df1764c818e0878736d32162aa2c897f264a4d2cce76b572cd6a6fd6960ee51f7ca7de47b6e4c9f30a76a4c39e2b37d45f433069c4774a6d9d4004bf148a885e9253200c5c14ba79712b08de930d591649c3cc1d554e30a8815bab25bcb2494a31212a3eed18c2e24a502d", 0x0, 0x2, 0x0, 0x800}, 0x50) (async) perf_event_open$cgroup(&(0x7f0000000b00)={0x0, 0x80, 0x2, 0x6, 0x3, 0x6, 0x0, 0x6, 0x3000, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf37, 0x4, @perf_bp={&(0x7f0000000ac0), 0x2}, 0x0, 0xffffffffffffffff, 0x6, 0x4, 0x401, 0xff, 0x92, 0x0, 0x7, 0x0, 0x5}, r0, 0x8, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000004c0)={@ifindex=r1, 0x1e, 0x1, 0x7fff, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) 02:27:30 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:30 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x2d, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc5d}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x5}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x44}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @alu={0x4, 0x1, 0xb, 0x1, 0x8, 0x100, 0x4}, @call={0x85, 0x0, 0x0, 0x26}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x1, 0xe2, &(0x7f00000006c0)=""/226, 0x41100, 0x43, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000a40)={r2, 0x0, 0x6d, 0x0, &(0x7f0000000900)="60f600f2e21f6e9e076cda43a25affedac58c05eccbeb9233302e420bbdc6a1cb03aed2b966ede66b2527cd0fa057caefd33e353250c7639d999735b60007986443045221591b18c9371c36a3843516b6aa8e2d3f5bac5144913b7f418540184f876317c2c0965826d3a017aec", 0x0, 0x20, 0x0, 0xbb, 0x0, &(0x7f0000000980)="00c41fdb525ff83d03ad8c2ef8098dc2047574b7f5d479183871b4eb2f9b882c7bfa2e9cdcee23c92f118b1f91b25b07cfe129801799b328262d6751e99ea03da7e5466dc6ef8a2a9a86a02204ee2db4df1764c818e0878736d32162aa2c897f264a4d2cce76b572cd6a6fd6960ee51f7ca7de47b6e4c9f30a76a4c39e2b37d45f433069c4774a6d9d4004bf148a885e9253200c5c14ba79712b08de930d591649c3cc1d554e30a8815bab25bcb2494a31212a3eed18c2e24a502d", 0x0, 0x2, 0x0, 0x800}, 0x50) (async) perf_event_open$cgroup(&(0x7f0000000b00)={0x0, 0x80, 0x2, 0x6, 0x3, 0x6, 0x0, 0x6, 0x3000, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf37, 0x4, @perf_bp={&(0x7f0000000ac0), 0x2}, 0x0, 0xffffffffffffffff, 0x6, 0x4, 0x401, 0xff, 0x92, 0x0, 0x7, 0x0, 0x5}, r0, 0x8, 0xffffffffffffffff, 0x2) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000004c0)={@ifindex=r1, 0x1e, 0x1, 0x7fff, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) 02:27:31 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffff8c, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x5}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000002180)={&(0x7f00000000c0)="ad3bfe6a945ed66fe5ea53b7451b11b8c3d7262e795d2d64632b875cf51493f73000978ca6b2814b2c564d248cba3f0bc25d8f9af5067ad119fff5357c6bd63f853359f61117aaa1edd67495ea549f22ed28554c4fa18c4cde122a8885bae0c78d4139b403663936c225a66b1bee46e4ac6f5b06840bc24d6195abdaad8b40e785ca3ed9605924bde38016d0c37a9024cfa7ab8d99f01934da8b40737d636516e9eeacf410766dc9275a2fa359d48fcafd3cf64d49711d60ca6ceb156da79d9548be0a956bb53c65cab7668a6ecea083bafaa783935a401bd791b98f3f21a1b103fc2fe1bb0d97a2c2053c32e00296474e4d793ac9335632795a39155edfa8903f5a80ec35e8ff9035c72d8353caf5d8bb53247073bc718970af0da897bde8eff4f3ce0491e0d47e6d1aa06431f0d02f66113f482000a5498404c2b5df96a760bc8f451c712796994493dc410886f86cfc2cc3b9ac31be0612890ffa0cb854ea129b0e30e370618d091e009bd40f8e9b25b80925777b3e91562d2261a2a54b86b536c7d31ce36e04d2166882583317700fbfc53cea97223762f771e33d2d2a878ab4711546a4896c8af4764a6317d769846c2c97def5b0be36738675d193230effd7013e0ab90426a2ed847450c6790df714d6c95b629d307646f1b7aa638c9f2739b489c898652e7e29ec5e63b4f2c248a435521d9491a5d2ee098a367f9bb3b97d528f23461edcff19e559b02e9b539a2459d8931c889cb2fd55f89ea4313d7c8cf0cdd9760475bb83c78ed3337a57205689a1d8349801ab8974cbc1516146e29ef0e2804c7b99f08362003f02fc7333701f03cf9e1fa5d3f2400232dd2ca5a7fb97571883a1a3f0654154151e7118c238c9878d10d4c4b9907bf5af6806bf9cbc45b0d8f8c66ae7a351af1be1b00de345d1bcda96b48704c84be4ee2f739da469b5d7549538100dd78c5b37dc4f17b0e000c0b7d2f0677fb47cfc0443de64abbe2030fe172c72e3dcdfa2641777d07e5bde8649cc0666bb4ec831ff90aefed836ed36237f1f80b08c17b4313a885b46d2c74d7ae1cd40babe9d69c1c9cadcb1f59845c98a5db9000291625ec64a98f0afca9c0141a6e949eb2f53014ec3e312a5bac58dd08153541988c3c63f28ec37240f84271992db07751306af74e57d534f3844ae70d75a07e7bc54cd5899af945bd9b915d67ef4f42a98c1dfe8933cceb35c55ebce2e556d007693cc27b5e7f9cc6c0a13890c1253fd0ed911fe0e650b903c5b68628f41df59f4ace680976dd1db0566b17d414b6faa583145c3426c9d286143e47030f81ae009536ae69b6fc967236209139b4b991cd299148cc762b3be10e4311860fa867f50510b92de031cb5e398ab3ca9829f053e8147af9e2d06452ffa69b7d1d97c24d021651700bdbd9d73d7cd46b68277217054e15cc21210b8e80df2034e57343008018198334f48dd8c763b7948932d867763f581d44970f1eed555066749d7cd5f7f197a5bbbf8e86f15282b00f89945d0322652df5025ecaed71d8d481005f3d376bba2372e2288a255d84015aa481072f2d4690b522ce6ebfdff34b37e0eda8348ef7b3c2d61288cf071746be152c2f91538fe653274ea99458118ffc8951b8be10c8c552ebc9432159000633aca5324b6fe47c67a0cc1bd85b22c1731ced1aa9834423775ddbc2c31e1041604eb5be23c31968c436b60bf3be5abb78bb0da71e7b886a4899a7c469ef405dd198a027500b911527ac06165bb9072a69026f0b55a63f8bd8173d80209911e3fd5a1c808be50d9b5a5277375c76d0656c459047da831317473f211799fe0e26bcd0cb12d0d445ffdde0d690d8a8e67ec2b700c28db7b6d5253a54e7738a25c6c2397a0ff5f0fc87934f2e51f939447abb184b1f9026dafae2622ec3928b9eacd03cea35d943f867ee823bace6ce036f916acda72d0b81e02fb02f783ec3ea61dfc693d2d8597b35f4fd31cee19c0f2c8bffada86bf5561ea9c56836ec15f13f3063da8223b56f20aa97ef5d9e185675b6a2287a8f20e97f65bd6e57ad35c31210c5b66928a81c77f06293a1118ff1059840562eeaf63e67e860fd76bd3c5f1bd0a89bfb483e6c7ebb01ad7d7ae008447bc727faf5b80517f2356c5c71639d1be163a7e22fa1da6655aaad51be77ac2175ab5ab1c73a5ec487e0d4ad57edb0851f0e12b9e9234f893273103f5aab840ddf24d5c0238a023631a94f101b9c637e98b31ae8d708b1a9a5999d449e1f07335e94767c16577108637d165bdedd94bc923d2f506db5f30c1bede0bfa2c2c07410233d7a4de2d72d5c6c6af300ae628ca269c233e68528d6872edf1cdd8f3a6f0f5cac8bc47fff26f573842311644c1ea6104cb0dac1134b11089055b8b4ea724f9fa111fdddd8d202c32204bb2219b11a37b94797c5b19ea2342c1e27a070faf2fe7dfaf8205bef5e12eb52a838d6bf1ac46fe7727adc818f270a91dedebc4b9532615a1c0103cf5a8444ced68af64be120f9735ada247cb8be4134b7a4351038ce8e417563d541b4217d606fdeb90c703b598e74d0a312fb4dfcc86bb2a929402cb52135618d8822ea478a1eab0955a67f4c25cbc4af29e247bf9ad912b6dc7107ce609f168489b0e319bdddb002f49d7b25026123e2cb6adab472d2af4300f2328509d370dd3a3b4cf58abda0f98d44db360e4e93e2b51e230d43abe71d2533b32c4ffbad5a4e10dc1652970355fc98795ca28cc107926613d57d6c65df0726f13fecd7b5bbf5ad4fdc32d14761caaf39d58a55e635b7643e6008c2be81bb1bd7eed65329b5d15ed1bc5ae2121250c196d14644636650dc8fd1ccfeb76552bec87cdbdcd8898656f76df6b7c01dfcbf7fc4851f7b21ae5749d1e2e73cf0acfe199b88a434599a2a1705ee6a7ac655e5ff37a6e991dbc5a457d29ef060e4514cc65a4474a3489b83f8b4b9f4bace79d1ec27fd6fa1d03889d067c26a26ef751cce6a31ddc0dc915f4ea4310e663ea84028f9fe12697cda246e34d82579e1889ff82cec4cbff87abc3f880c608324621f04fc6e2d130a0fbd5b8c503631bec8a22a9b699840da245e5d3318d01f55b5e85eac0348ad470fd7ae20b4719e46b4911ef572f9fdd96b1f8c6fa45af122714456519da2cac1d7e39dff7ef5a1cb71edeca4237d3d139223cf3170a7253b2414ee1bd56b8c004d002dee89da1c7111ad6e1295c6439a5bd450b2f3314ad61b730b79579cf0139a8ee75d16bba2325d9c5081b252e85d3471794e8d0500ee0ae4a761334e55d2fbce46353d9eeb75c95453ea3fd7458129d89fba8ac7c7100f15bcaddcbf5134d7b28e8a9388b0f663bc3336340e63613accdeaf3e4d6062d0961641c50c023d854f90835be543866766ce6a6f51e7bb310ba1de94a6ee8651b3e97691ccffc2f3b8a8f7e3bf09bc748ec43631dfaaab3cf9f4d59afb3f875537fe40572e376acc6c1de80c3b96fbd6bdb6cf3b19dd2707e2f16c0e748482d42fb6215696dcc93435c40f32439e0224b3c950251e7004fd24e928ad2fef3f105d23fae2c75fe221b53102ed67c45a7ee7412e0772b5ca11292680759d3019199b0a10af66cde6006fa9de1f6900520d1ca2e8510d58f5c0da6b1a3e6e1d6ce18761eae7a898afb162e172114b96bc09e2d38db45d043721dd8a91174fa13c375025aa3ea33da65db9ba6ca9322d19dec782888aa548d78bdf1085425396bda5e370b845af3011b8749ec1866b3e1d50ea31aee5f9659c67ac558efdd6ab996c56ae7554013dbd6f98ee30cf059b3fd3181e3dfb45058b56ec7d62fc9e8d838e50b6c1a5d3afe3350d51b74fb1eab4a423a2202e27fac8ba1b004ef6726a3f3bffa7a4d19496b75b6617c99178560d22cc4ca26e169f477563cdd06fc577f01129a0378d48288fb248a1395eeeeea7d13ae88d83339184407ef859e2fccd8a32cd835476a4c9c5a1cf49eb0213d3e4aa38807d0aad3028f59cdf4e29108b8196536e308b2bcf30d96ed9da0fd0299f5ace3b855824bc2ad380a452294686bac0e7fea8e9306d41475fbc147b23b0c2d9a572bb60824d897abe7cad9df418388cda40ea257ac8e366732c3730e495f44a0665231b3e0c649321c32bc687594902084b64ed4bcc516aadd1932dd94c64edc040ee4ca9826795ff43690896159a559fc5eafd4c79dd3dd57700fbbd94f13fc186eac01934eaa013ac9004a024bb4aca75673c205580185a9e6c243a08d1a5fa6a16f6c94fc7b2fd44bc70700ea7c11c42ee6f6de982f02e6ba18f6971ec8ee56fd20727f35579a72e4c348e6633efdf7b4fbbca9e6de05e67048579e89437e98cbe6e43dbc1a8932b485f8696a8046059e713e766646eb99c1191c722a0356fb3834f0b20cc65b2878709ff0f39ec7ec91e4cb806ede0048381c9ed90f5a21215f61baf0a8e6a7de031a1ab4cda5dd3b612223e784df9148c8c16ae4615452fb291e78e6089cdc18d5aa55e41778bbbf14cdbb3ddcdd774a3d4775d33533bd5960fc1f182fe3ef54ef8d2cf0583c5036a8f818a4fe011506bfcab25aff451e8285090361405ac5e6ab954826b4ad4a089dc99f03aed6f4ed5230b32cd85957c696b6091cccd3c7de99c32dfd37528546fce282486af60a13e13b20bbfd1cfdf4a3e2374e9306f7d8158401cfd004d35a715b5b71b2852db6e6e0e1f431a6781ffa967b6835878e09d5d86ffb92493ef8e6e43050b2737c06cbcc0a583c9744112c7fda32eebd82c8a0bd719b733d9e5a730db678ae30506ebd665e8a6e074c4fc5c41ee3c575cd85e668e8777c3c325668caad574bc4db458e245758ff702de50c0cf62676deac862b5aca23fdc78a3604dcdb6cf49e897ab9d3adeed9c45b731496187deb14e7bd6dd1afe18044b2a7e7f302f42da4deb09ba1c9381ef2937cedb11cf03ca9e8dfe09e0b36e3ccea2c25ddb59297a78c895ab9dfa86a55149d3950a9664ce1f327a9bba648bcf8dd0e156b72cf3376b1e0107658f44b1357932bc77aa8c1caea40a36a9d796056195ca378aad422705e67e7d05e51e2cc1d410772eeaa1bb3bff7b631e22ca8de4dcf93bc9cd36aba3174cc1978fd15f1f0e06853792dcce247c7cdd3ccf5d54d5b73f8225d7262f0a33de19755906462949c7be68ceccf48a33531064dc2c86bff014b816e04c2ca5c3ece3e0772bbfbd5fd3d4d076a72d5f790ca868ec2d94676cc564a825d6d62786ea047ccf52654c3c36bf48fe7324fc701ea59c4a18ca1b0ed58e017865ceb5d20d90cabbe3ba1651209a2e4aadbd482e1cab65697defc2df49f1198a1d0cdf2b1a14a836d8b36c8144a9dc4be2e74c06233af9ef6212614296af48e8543c32c316e1e8edc7b79513d0a3584a2b222caa06e3c67b0309c4aff8c436c79aad6d0aa0a56c49cbf7ed89e66a7d9ea2fe75709fd30f713ff2dd4ba0aa7759d8110a012276a5dbb8500a4e4859cd968a73298ca38fa16b0509b38ecc2eb9be423d6f62903ed8eca12d341ff552f71f07959c9b9c2e366269437bd05f7d6573f71fdff891513fa7e68418bf998c6eaa38c50d432163e3999bbf9f3bce26d9ebaddeedbc35cd5dfca591d57a24b307d701aef2b182c11e34032c5ae36d1226c3d1883be846849e332a8d9f075b277c4dcfc2a714388c18327fb6df8cedcb7f92f6fb61a1006210e55070be13a0195370f807d531d0b6b6d8134166cccf0260ab85db8ee7935e09e78ba7d9929c08372799a2a8199031d000f202e2139310c29b14691d266", &(0x7f00000010c0)=""/117, &(0x7f0000001140)="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", &(0x7f0000002140)="ed143db73fd6c44a32c5b3524d688616320577620c2a5db0bdd87e9f1254c256c7766753ad433fa68fe6d476a324", 0xffffff52, r0}, 0x38) r1 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x2, 0x80, 0x1, 0x2, 0x1, 0x6, 0x0, 0x8, 0x8a190, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x14040, 0x5, 0x9, 0x0, 0x7d43, 0x5, 0x1, 0x0, 0x8000, 0x0, 0x8001}) 02:27:31 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffff8c, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x5}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000002180)={&(0x7f00000000c0)="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", &(0x7f00000010c0)=""/117, &(0x7f0000001140)="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", &(0x7f0000002140)="ed143db73fd6c44a32c5b3524d688616320577620c2a5db0bdd87e9f1254c256c7766753ad433fa68fe6d476a324", 0xffffff52, r0}, 0x38) (async) r1 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x2, 0x80, 0x1, 0x2, 0x1, 0x6, 0x0, 0x8, 0x8a190, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x14040, 0x5, 0x9, 0x0, 0x7d43, 0x5, 0x1, 0x0, 0x8000, 0x0, 0x8001}) 02:27:31 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffff8c, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x5}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000002180)={&(0x7f00000000c0)="ad3bfe6a945ed66fe5ea53b7451b11b8c3d7262e795d2d64632b875cf51493f73000978ca6b2814b2c564d248cba3f0bc25d8f9af5067ad119fff5357c6bd63f853359f61117aaa1edd67495ea549f22ed28554c4fa18c4cde122a8885bae0c78d4139b403663936c225a66b1bee46e4ac6f5b06840bc24d6195abdaad8b40e785ca3ed9605924bde38016d0c37a9024cfa7ab8d99f01934da8b40737d636516e9eeacf410766dc9275a2fa359d48fcafd3cf64d49711d60ca6ceb156da79d9548be0a956bb53c65cab7668a6ecea083bafaa783935a401bd791b98f3f21a1b103fc2fe1bb0d97a2c2053c32e00296474e4d793ac9335632795a39155edfa8903f5a80ec35e8ff9035c72d8353caf5d8bb53247073bc718970af0da897bde8eff4f3ce0491e0d47e6d1aa06431f0d02f66113f482000a5498404c2b5df96a760bc8f451c712796994493dc410886f86cfc2cc3b9ac31be0612890ffa0cb854ea129b0e30e370618d091e009bd40f8e9b25b80925777b3e91562d2261a2a54b86b536c7d31ce36e04d2166882583317700fbfc53cea97223762f771e33d2d2a878ab4711546a4896c8af4764a6317d769846c2c97def5b0be36738675d193230effd7013e0ab90426a2ed847450c6790df714d6c95b629d307646f1b7aa638c9f2739b489c898652e7e29ec5e63b4f2c248a435521d9491a5d2ee098a367f9bb3b97d528f23461edcff19e559b02e9b539a2459d8931c889cb2fd55f89ea4313d7c8cf0cdd9760475bb83c78ed3337a57205689a1d8349801ab8974cbc1516146e29ef0e2804c7b99f08362003f02fc7333701f03cf9e1fa5d3f2400232dd2ca5a7fb97571883a1a3f0654154151e7118c238c9878d10d4c4b9907bf5af6806bf9cbc45b0d8f8c66ae7a351af1be1b00de345d1bcda96b48704c84be4ee2f739da469b5d7549538100dd78c5b37dc4f17b0e000c0b7d2f0677fb47cfc0443de64abbe2030fe172c72e3dcdfa2641777d07e5bde8649cc0666bb4ec831ff90aefed836ed36237f1f80b08c17b4313a885b46d2c74d7ae1cd40babe9d69c1c9cadcb1f59845c98a5db9000291625ec64a98f0afca9c0141a6e949eb2f53014ec3e312a5bac58dd08153541988c3c63f28ec37240f84271992db07751306af74e57d534f3844ae70d75a07e7bc54cd5899af945bd9b915d67ef4f42a98c1dfe8933cceb35c55ebce2e556d007693cc27b5e7f9cc6c0a13890c1253fd0ed911fe0e650b903c5b68628f41df59f4ace680976dd1db0566b17d414b6faa583145c3426c9d286143e47030f81ae009536ae69b6fc967236209139b4b991cd299148cc762b3be10e4311860fa867f50510b92de031cb5e398ab3ca9829f053e8147af9e2d06452ffa69b7d1d97c24d021651700bdbd9d73d7cd46b68277217054e15cc21210b8e80df2034e57343008018198334f48dd8c763b7948932d867763f581d44970f1eed555066749d7cd5f7f197a5bbbf8e86f15282b00f89945d0322652df5025ecaed71d8d481005f3d376bba2372e2288a255d84015aa481072f2d4690b522ce6ebfdff34b37e0eda8348ef7b3c2d61288cf071746be152c2f91538fe653274ea99458118ffc8951b8be10c8c552ebc9432159000633aca5324b6fe47c67a0cc1bd85b22c1731ced1aa9834423775ddbc2c31e1041604eb5be23c31968c436b60bf3be5abb78bb0da71e7b886a4899a7c469ef405dd198a027500b911527ac06165bb9072a69026f0b55a63f8bd8173d80209911e3fd5a1c808be50d9b5a5277375c76d0656c459047da831317473f211799fe0e26bcd0cb12d0d445ffdde0d690d8a8e67ec2b700c28db7b6d5253a54e7738a25c6c2397a0ff5f0fc87934f2e51f939447abb184b1f9026dafae2622ec3928b9eacd03cea35d943f867ee823bace6ce036f916acda72d0b81e02fb02f783ec3ea61dfc693d2d8597b35f4fd31cee19c0f2c8bffada86bf5561ea9c56836ec15f13f3063da8223b56f20aa97ef5d9e185675b6a2287a8f20e97f65bd6e57ad35c31210c5b66928a81c77f06293a1118ff1059840562eeaf63e67e860fd76bd3c5f1bd0a89bfb483e6c7ebb01ad7d7ae008447bc727faf5b80517f2356c5c71639d1be163a7e22fa1da6655aaad51be77ac2175ab5ab1c73a5ec487e0d4ad57edb0851f0e12b9e9234f893273103f5aab840ddf24d5c0238a023631a94f101b9c637e98b31ae8d708b1a9a5999d449e1f07335e94767c16577108637d165bdedd94bc923d2f506db5f30c1bede0bfa2c2c07410233d7a4de2d72d5c6c6af300ae628ca269c233e68528d6872edf1cdd8f3a6f0f5cac8bc47fff26f573842311644c1ea6104cb0dac1134b11089055b8b4ea724f9fa111fdddd8d202c32204bb2219b11a37b94797c5b19ea2342c1e27a070faf2fe7dfaf8205bef5e12eb52a838d6bf1ac46fe7727adc818f270a91dedebc4b9532615a1c0103cf5a8444ced68af64be120f9735ada247cb8be4134b7a4351038ce8e417563d541b4217d606fdeb90c703b598e74d0a312fb4dfcc86bb2a929402cb52135618d8822ea478a1eab0955a67f4c25cbc4af29e247bf9ad912b6dc7107ce609f168489b0e319bdddb002f49d7b25026123e2cb6adab472d2af4300f2328509d370dd3a3b4cf58abda0f98d44db360e4e93e2b51e230d43abe71d2533b32c4ffbad5a4e10dc1652970355fc98795ca28cc107926613d57d6c65df0726f13fecd7b5bbf5ad4fdc32d14761caaf39d58a55e635b7643e6008c2be81bb1bd7eed65329b5d15ed1bc5ae2121250c196d14644636650dc8fd1ccfeb76552bec87cdbdcd8898656f76df6b7c01dfcbf7fc4851f7b21ae5749d1e2e73cf0acfe199b88a434599a2a1705ee6a7ac655e5ff37a6e991dbc5a457d29ef060e4514cc65a4474a3489b83f8b4b9f4bace79d1ec27fd6fa1d03889d067c26a26ef751cce6a31ddc0dc915f4ea4310e663ea84028f9fe12697cda246e34d82579e1889ff82cec4cbff87abc3f880c608324621f04fc6e2d130a0fbd5b8c503631bec8a22a9b699840da245e5d3318d01f55b5e85eac0348ad470fd7ae20b4719e46b4911ef572f9fdd96b1f8c6fa45af122714456519da2cac1d7e39dff7ef5a1cb71edeca4237d3d139223cf3170a7253b2414ee1bd56b8c004d002dee89da1c7111ad6e1295c6439a5bd450b2f3314ad61b730b79579cf0139a8ee75d16bba2325d9c5081b252e85d3471794e8d0500ee0ae4a761334e55d2fbce46353d9eeb75c95453ea3fd7458129d89fba8ac7c7100f15bcaddcbf5134d7b28e8a9388b0f663bc3336340e63613accdeaf3e4d6062d0961641c50c023d854f90835be543866766ce6a6f51e7bb310ba1de94a6ee8651b3e97691ccffc2f3b8a8f7e3bf09bc748ec43631dfaaab3cf9f4d59afb3f875537fe40572e376acc6c1de80c3b96fbd6bdb6cf3b19dd2707e2f16c0e748482d42fb6215696dcc93435c40f32439e0224b3c950251e7004fd24e928ad2fef3f105d23fae2c75fe221b53102ed67c45a7ee7412e0772b5ca11292680759d3019199b0a10af66cde6006fa9de1f6900520d1ca2e8510d58f5c0da6b1a3e6e1d6ce18761eae7a898afb162e172114b96bc09e2d38db45d043721dd8a91174fa13c375025aa3ea33da65db9ba6ca9322d19dec782888aa548d78bdf1085425396bda5e370b845af3011b8749ec1866b3e1d50ea31aee5f9659c67ac558efdd6ab996c56ae7554013dbd6f98ee30cf059b3fd3181e3dfb45058b56ec7d62fc9e8d838e50b6c1a5d3afe3350d51b74fb1eab4a423a2202e27fac8ba1b004ef6726a3f3bffa7a4d19496b75b6617c99178560d22cc4ca26e169f477563cdd06fc577f01129a0378d48288fb248a1395eeeeea7d13ae88d83339184407ef859e2fccd8a32cd835476a4c9c5a1cf49eb0213d3e4aa38807d0aad3028f59cdf4e29108b8196536e308b2bcf30d96ed9da0fd0299f5ace3b855824bc2ad380a452294686bac0e7fea8e9306d41475fbc147b23b0c2d9a572bb60824d897abe7cad9df418388cda40ea257ac8e366732c3730e495f44a0665231b3e0c649321c32bc687594902084b64ed4bcc516aadd1932dd94c64edc040ee4ca9826795ff43690896159a559fc5eafd4c79dd3dd57700fbbd94f13fc186eac01934eaa013ac9004a024bb4aca75673c205580185a9e6c243a08d1a5fa6a16f6c94fc7b2fd44bc70700ea7c11c42ee6f6de982f02e6ba18f6971ec8ee56fd20727f35579a72e4c348e6633efdf7b4fbbca9e6de05e67048579e89437e98cbe6e43dbc1a8932b485f8696a8046059e713e766646eb99c1191c722a0356fb3834f0b20cc65b2878709ff0f39ec7ec91e4cb806ede0048381c9ed90f5a21215f61baf0a8e6a7de031a1ab4cda5dd3b612223e784df9148c8c16ae4615452fb291e78e6089cdc18d5aa55e41778bbbf14cdbb3ddcdd774a3d4775d33533bd5960fc1f182fe3ef54ef8d2cf0583c5036a8f818a4fe011506bfcab25aff451e8285090361405ac5e6ab954826b4ad4a089dc99f03aed6f4ed5230b32cd85957c696b6091cccd3c7de99c32dfd37528546fce282486af60a13e13b20bbfd1cfdf4a3e2374e9306f7d8158401cfd004d35a715b5b71b2852db6e6e0e1f431a6781ffa967b6835878e09d5d86ffb92493ef8e6e43050b2737c06cbcc0a583c9744112c7fda32eebd82c8a0bd719b733d9e5a730db678ae30506ebd665e8a6e074c4fc5c41ee3c575cd85e668e8777c3c325668caad574bc4db458e245758ff702de50c0cf62676deac862b5aca23fdc78a3604dcdb6cf49e897ab9d3adeed9c45b731496187deb14e7bd6dd1afe18044b2a7e7f302f42da4deb09ba1c9381ef2937cedb11cf03ca9e8dfe09e0b36e3ccea2c25ddb59297a78c895ab9dfa86a55149d3950a9664ce1f327a9bba648bcf8dd0e156b72cf3376b1e0107658f44b1357932bc77aa8c1caea40a36a9d796056195ca378aad422705e67e7d05e51e2cc1d410772eeaa1bb3bff7b631e22ca8de4dcf93bc9cd36aba3174cc1978fd15f1f0e06853792dcce247c7cdd3ccf5d54d5b73f8225d7262f0a33de19755906462949c7be68ceccf48a33531064dc2c86bff014b816e04c2ca5c3ece3e0772bbfbd5fd3d4d076a72d5f790ca868ec2d94676cc564a825d6d62786ea047ccf52654c3c36bf48fe7324fc701ea59c4a18ca1b0ed58e017865ceb5d20d90cabbe3ba1651209a2e4aadbd482e1cab65697defc2df49f1198a1d0cdf2b1a14a836d8b36c8144a9dc4be2e74c06233af9ef6212614296af48e8543c32c316e1e8edc7b79513d0a3584a2b222caa06e3c67b0309c4aff8c436c79aad6d0aa0a56c49cbf7ed89e66a7d9ea2fe75709fd30f713ff2dd4ba0aa7759d8110a012276a5dbb8500a4e4859cd968a73298ca38fa16b0509b38ecc2eb9be423d6f62903ed8eca12d341ff552f71f07959c9b9c2e366269437bd05f7d6573f71fdff891513fa7e68418bf998c6eaa38c50d432163e3999bbf9f3bce26d9ebaddeedbc35cd5dfca591d57a24b307d701aef2b182c11e34032c5ae36d1226c3d1883be846849e332a8d9f075b277c4dcfc2a714388c18327fb6df8cedcb7f92f6fb61a1006210e55070be13a0195370f807d531d0b6b6d8134166cccf0260ab85db8ee7935e09e78ba7d9929c08372799a2a8199031d000f202e2139310c29b14691d266", &(0x7f00000010c0)=""/117, &(0x7f0000001140)="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", &(0x7f0000002140)="ed143db73fd6c44a32c5b3524d688616320577620c2a5db0bdd87e9f1254c256c7766753ad433fa68fe6d476a324", 0xffffff52, r0}, 0x38) r1 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x2, 0x80, 0x1, 0x2, 0x1, 0x6, 0x0, 0x8, 0x8a190, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x14040, 0x5, 0x9, 0x0, 0x7d43, 0x5, 0x1, 0x0, 0x8000, 0x0, 0x8001}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffff8c, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x5}, 0x48) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000002180)={&(0x7f00000000c0)="ad3bfe6a945ed66fe5ea53b7451b11b8c3d7262e795d2d64632b875cf51493f73000978ca6b2814b2c564d248cba3f0bc25d8f9af5067ad119fff5357c6bd63f853359f61117aaa1edd67495ea549f22ed28554c4fa18c4cde122a8885bae0c78d4139b403663936c225a66b1bee46e4ac6f5b06840bc24d6195abdaad8b40e785ca3ed9605924bde38016d0c37a9024cfa7ab8d99f01934da8b40737d636516e9eeacf410766dc9275a2fa359d48fcafd3cf64d49711d60ca6ceb156da79d9548be0a956bb53c65cab7668a6ecea083bafaa783935a401bd791b98f3f21a1b103fc2fe1bb0d97a2c2053c32e00296474e4d793ac9335632795a39155edfa8903f5a80ec35e8ff9035c72d8353caf5d8bb53247073bc718970af0da897bde8eff4f3ce0491e0d47e6d1aa06431f0d02f66113f482000a5498404c2b5df96a760bc8f451c712796994493dc410886f86cfc2cc3b9ac31be0612890ffa0cb854ea129b0e30e370618d091e009bd40f8e9b25b80925777b3e91562d2261a2a54b86b536c7d31ce36e04d2166882583317700fbfc53cea97223762f771e33d2d2a878ab4711546a4896c8af4764a6317d769846c2c97def5b0be36738675d193230effd7013e0ab90426a2ed847450c6790df714d6c95b629d307646f1b7aa638c9f2739b489c898652e7e29ec5e63b4f2c248a435521d9491a5d2ee098a367f9bb3b97d528f23461edcff19e559b02e9b539a2459d8931c889cb2fd55f89ea4313d7c8cf0cdd9760475bb83c78ed3337a57205689a1d8349801ab8974cbc1516146e29ef0e2804c7b99f08362003f02fc7333701f03cf9e1fa5d3f2400232dd2ca5a7fb97571883a1a3f0654154151e7118c238c9878d10d4c4b9907bf5af6806bf9cbc45b0d8f8c66ae7a351af1be1b00de345d1bcda96b48704c84be4ee2f739da469b5d7549538100dd78c5b37dc4f17b0e000c0b7d2f0677fb47cfc0443de64abbe2030fe172c72e3dcdfa2641777d07e5bde8649cc0666bb4ec831ff90aefed836ed36237f1f80b08c17b4313a885b46d2c74d7ae1cd40babe9d69c1c9cadcb1f59845c98a5db9000291625ec64a98f0afca9c0141a6e949eb2f53014ec3e312a5bac58dd08153541988c3c63f28ec37240f84271992db07751306af74e57d534f3844ae70d75a07e7bc54cd5899af945bd9b915d67ef4f42a98c1dfe8933cceb35c55ebce2e556d007693cc27b5e7f9cc6c0a13890c1253fd0ed911fe0e650b903c5b68628f41df59f4ace680976dd1db0566b17d414b6faa583145c3426c9d286143e47030f81ae009536ae69b6fc967236209139b4b991cd299148cc762b3be10e4311860fa867f50510b92de031cb5e398ab3ca9829f053e8147af9e2d06452ffa69b7d1d97c24d021651700bdbd9d73d7cd46b68277217054e15cc21210b8e80df2034e57343008018198334f48dd8c763b7948932d867763f581d44970f1eed555066749d7cd5f7f197a5bbbf8e86f15282b00f89945d0322652df5025ecaed71d8d481005f3d376bba2372e2288a255d84015aa481072f2d4690b522ce6ebfdff34b37e0eda8348ef7b3c2d61288cf071746be152c2f91538fe653274ea99458118ffc8951b8be10c8c552ebc9432159000633aca5324b6fe47c67a0cc1bd85b22c1731ced1aa9834423775ddbc2c31e1041604eb5be23c31968c436b60bf3be5abb78bb0da71e7b886a4899a7c469ef405dd198a027500b911527ac06165bb9072a69026f0b55a63f8bd8173d80209911e3fd5a1c808be50d9b5a5277375c76d0656c459047da831317473f211799fe0e26bcd0cb12d0d445ffdde0d690d8a8e67ec2b700c28db7b6d5253a54e7738a25c6c2397a0ff5f0fc87934f2e51f939447abb184b1f9026dafae2622ec3928b9eacd03cea35d943f867ee823bace6ce036f916acda72d0b81e02fb02f783ec3ea61dfc693d2d8597b35f4fd31cee19c0f2c8bffada86bf5561ea9c56836ec15f13f3063da8223b56f20aa97ef5d9e185675b6a2287a8f20e97f65bd6e57ad35c31210c5b66928a81c77f06293a1118ff1059840562eeaf63e67e860fd76bd3c5f1bd0a89bfb483e6c7ebb01ad7d7ae008447bc727faf5b80517f2356c5c71639d1be163a7e22fa1da6655aaad51be77ac2175ab5ab1c73a5ec487e0d4ad57edb0851f0e12b9e9234f893273103f5aab840ddf24d5c0238a023631a94f101b9c637e98b31ae8d708b1a9a5999d449e1f07335e94767c16577108637d165bdedd94bc923d2f506db5f30c1bede0bfa2c2c07410233d7a4de2d72d5c6c6af300ae628ca269c233e68528d6872edf1cdd8f3a6f0f5cac8bc47fff26f573842311644c1ea6104cb0dac1134b11089055b8b4ea724f9fa111fdddd8d202c32204bb2219b11a37b94797c5b19ea2342c1e27a070faf2fe7dfaf8205bef5e12eb52a838d6bf1ac46fe7727adc818f270a91dedebc4b9532615a1c0103cf5a8444ced68af64be120f9735ada247cb8be4134b7a4351038ce8e417563d541b4217d606fdeb90c703b598e74d0a312fb4dfcc86bb2a929402cb52135618d8822ea478a1eab0955a67f4c25cbc4af29e247bf9ad912b6dc7107ce609f168489b0e319bdddb002f49d7b25026123e2cb6adab472d2af4300f2328509d370dd3a3b4cf58abda0f98d44db360e4e93e2b51e230d43abe71d2533b32c4ffbad5a4e10dc1652970355fc98795ca28cc107926613d57d6c65df0726f13fecd7b5bbf5ad4fdc32d14761caaf39d58a55e635b7643e6008c2be81bb1bd7eed65329b5d15ed1bc5ae2121250c196d14644636650dc8fd1ccfeb76552bec87cdbdcd8898656f76df6b7c01dfcbf7fc4851f7b21ae5749d1e2e73cf0acfe199b88a434599a2a1705ee6a7ac655e5ff37a6e991dbc5a457d29ef060e4514cc65a4474a3489b83f8b4b9f4bace79d1ec27fd6fa1d03889d067c26a26ef751cce6a31ddc0dc915f4ea4310e663ea84028f9fe12697cda246e34d82579e1889ff82cec4cbff87abc3f880c608324621f04fc6e2d130a0fbd5b8c503631bec8a22a9b699840da245e5d3318d01f55b5e85eac0348ad470fd7ae20b4719e46b4911ef572f9fdd96b1f8c6fa45af122714456519da2cac1d7e39dff7ef5a1cb71edeca4237d3d139223cf3170a7253b2414ee1bd56b8c004d002dee89da1c7111ad6e1295c6439a5bd450b2f3314ad61b730b79579cf0139a8ee75d16bba2325d9c5081b252e85d3471794e8d0500ee0ae4a761334e55d2fbce46353d9eeb75c95453ea3fd7458129d89fba8ac7c7100f15bcaddcbf5134d7b28e8a9388b0f663bc3336340e63613accdeaf3e4d6062d0961641c50c023d854f90835be543866766ce6a6f51e7bb310ba1de94a6ee8651b3e97691ccffc2f3b8a8f7e3bf09bc748ec43631dfaaab3cf9f4d59afb3f875537fe40572e376acc6c1de80c3b96fbd6bdb6cf3b19dd2707e2f16c0e748482d42fb6215696dcc93435c40f32439e0224b3c950251e7004fd24e928ad2fef3f105d23fae2c75fe221b53102ed67c45a7ee7412e0772b5ca11292680759d3019199b0a10af66cde6006fa9de1f6900520d1ca2e8510d58f5c0da6b1a3e6e1d6ce18761eae7a898afb162e172114b96bc09e2d38db45d043721dd8a91174fa13c375025aa3ea33da65db9ba6ca9322d19dec782888aa548d78bdf1085425396bda5e370b845af3011b8749ec1866b3e1d50ea31aee5f9659c67ac558efdd6ab996c56ae7554013dbd6f98ee30cf059b3fd3181e3dfb45058b56ec7d62fc9e8d838e50b6c1a5d3afe3350d51b74fb1eab4a423a2202e27fac8ba1b004ef6726a3f3bffa7a4d19496b75b6617c99178560d22cc4ca26e169f477563cdd06fc577f01129a0378d48288fb248a1395eeeeea7d13ae88d83339184407ef859e2fccd8a32cd835476a4c9c5a1cf49eb0213d3e4aa38807d0aad3028f59cdf4e29108b8196536e308b2bcf30d96ed9da0fd0299f5ace3b855824bc2ad380a452294686bac0e7fea8e9306d41475fbc147b23b0c2d9a572bb60824d897abe7cad9df418388cda40ea257ac8e366732c3730e495f44a0665231b3e0c649321c32bc687594902084b64ed4bcc516aadd1932dd94c64edc040ee4ca9826795ff43690896159a559fc5eafd4c79dd3dd57700fbbd94f13fc186eac01934eaa013ac9004a024bb4aca75673c205580185a9e6c243a08d1a5fa6a16f6c94fc7b2fd44bc70700ea7c11c42ee6f6de982f02e6ba18f6971ec8ee56fd20727f35579a72e4c348e6633efdf7b4fbbca9e6de05e67048579e89437e98cbe6e43dbc1a8932b485f8696a8046059e713e766646eb99c1191c722a0356fb3834f0b20cc65b2878709ff0f39ec7ec91e4cb806ede0048381c9ed90f5a21215f61baf0a8e6a7de031a1ab4cda5dd3b612223e784df9148c8c16ae4615452fb291e78e6089cdc18d5aa55e41778bbbf14cdbb3ddcdd774a3d4775d33533bd5960fc1f182fe3ef54ef8d2cf0583c5036a8f818a4fe011506bfcab25aff451e8285090361405ac5e6ab954826b4ad4a089dc99f03aed6f4ed5230b32cd85957c696b6091cccd3c7de99c32dfd37528546fce282486af60a13e13b20bbfd1cfdf4a3e2374e9306f7d8158401cfd004d35a715b5b71b2852db6e6e0e1f431a6781ffa967b6835878e09d5d86ffb92493ef8e6e43050b2737c06cbcc0a583c9744112c7fda32eebd82c8a0bd719b733d9e5a730db678ae30506ebd665e8a6e074c4fc5c41ee3c575cd85e668e8777c3c325668caad574bc4db458e245758ff702de50c0cf62676deac862b5aca23fdc78a3604dcdb6cf49e897ab9d3adeed9c45b731496187deb14e7bd6dd1afe18044b2a7e7f302f42da4deb09ba1c9381ef2937cedb11cf03ca9e8dfe09e0b36e3ccea2c25ddb59297a78c895ab9dfa86a55149d3950a9664ce1f327a9bba648bcf8dd0e156b72cf3376b1e0107658f44b1357932bc77aa8c1caea40a36a9d796056195ca378aad422705e67e7d05e51e2cc1d410772eeaa1bb3bff7b631e22ca8de4dcf93bc9cd36aba3174cc1978fd15f1f0e06853792dcce247c7cdd3ccf5d54d5b73f8225d7262f0a33de19755906462949c7be68ceccf48a33531064dc2c86bff014b816e04c2ca5c3ece3e0772bbfbd5fd3d4d076a72d5f790ca868ec2d94676cc564a825d6d62786ea047ccf52654c3c36bf48fe7324fc701ea59c4a18ca1b0ed58e017865ceb5d20d90cabbe3ba1651209a2e4aadbd482e1cab65697defc2df49f1198a1d0cdf2b1a14a836d8b36c8144a9dc4be2e74c06233af9ef6212614296af48e8543c32c316e1e8edc7b79513d0a3584a2b222caa06e3c67b0309c4aff8c436c79aad6d0aa0a56c49cbf7ed89e66a7d9ea2fe75709fd30f713ff2dd4ba0aa7759d8110a012276a5dbb8500a4e4859cd968a73298ca38fa16b0509b38ecc2eb9be423d6f62903ed8eca12d341ff552f71f07959c9b9c2e366269437bd05f7d6573f71fdff891513fa7e68418bf998c6eaa38c50d432163e3999bbf9f3bce26d9ebaddeedbc35cd5dfca591d57a24b307d701aef2b182c11e34032c5ae36d1226c3d1883be846849e332a8d9f075b277c4dcfc2a714388c18327fb6df8cedcb7f92f6fb61a1006210e55070be13a0195370f807d531d0b6b6d8134166cccf0260ab85db8ee7935e09e78ba7d9929c08372799a2a8199031d000f202e2139310c29b14691d266", &(0x7f00000010c0)=""/117, &(0x7f0000001140)="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", &(0x7f0000002140)="ed143db73fd6c44a32c5b3524d688616320577620c2a5db0bdd87e9f1254c256c7766753ad433fa68fe6d476a324", 0xffffff52, r0}, 0x38) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x2, 0x80, 0x1, 0x2, 0x1, 0x6, 0x0, 0x8, 0x8a190, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x14040, 0x5, 0x9, 0x0, 0x7d43, 0x5, 0x1, 0x0, 0x8000, 0x0, 0x8001}) (async) 02:27:31 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) 02:27:31 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) 02:27:31 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) 02:27:31 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:31 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:31 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:32 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:32 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:32 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:32 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x3, 0x80, 0x4, 0x4, 0x80, 0x1, 0x0, 0x2, 0x48818, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7843, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}, 0x280, 0xffff, 0x3ff, 0x8, 0x4, 0xfff, 0x4, 0x0, 0x43c48302, 0x0, 0x1}) 02:27:32 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:32 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x3, 0x80, 0x4, 0x4, 0x80, 0x1, 0x0, 0x2, 0x48818, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7843, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}, 0x280, 0xffff, 0x3ff, 0x8, 0x4, 0xfff, 0x4, 0x0, 0x43c48302, 0x0, 0x1}) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x3, 0x80, 0x4, 0x4, 0x80, 0x1, 0x0, 0x2, 0x48818, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7843, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}, 0x280, 0xffff, 0x3ff, 0x8, 0x4, 0xfff, 0x4, 0x0, 0x43c48302, 0x0, 0x1}) (async) 02:27:32 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x3, 0x80, 0x4, 0x4, 0x80, 0x1, 0x0, 0x2, 0x48818, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7843, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}, 0x280, 0xffff, 0x3ff, 0x8, 0x4, 0xfff, 0x4, 0x0, 0x43c48302, 0x0, 0x1}) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x3, 0x80, 0x4, 0x4, 0x80, 0x1, 0x0, 0x2, 0x48818, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7843, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}, 0x280, 0xffff, 0x3ff, 0x8, 0x4, 0xfff, 0x4, 0x0, 0x43c48302, 0x0, 0x1}) (async) 02:27:32 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:32 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:33 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:33 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) 02:27:33 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) 02:27:33 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:33 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) 02:27:33 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:33 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x80, 0x0, 0x1, 0x5, 0x0, 0x7, 0x24040, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x7, 0x10000}, 0x10, 0x6, 0x7fffffff, 0x9, 0x2e28, 0x8cd, 0x5, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xe, r0, 0x9) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xfffffffffffffffe) 02:27:33 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x80, 0x0, 0x1, 0x5, 0x0, 0x7, 0x24040, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x7, 0x10000}, 0x10, 0x6, 0x7fffffff, 0x9, 0x2e28, 0x8cd, 0x5, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xe, r0, 0x9) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xfffffffffffffffe) 02:27:33 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x80, 0x0, 0x1, 0x5, 0x0, 0x7, 0x24040, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x7, 0x10000}, 0x10, 0x6, 0x7fffffff, 0x9, 0x2e28, 0x8cd, 0x5, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xe, r0, 0x9) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xfffffffffffffffe) 02:27:33 executing program 1: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000180)=""/175, 0xaf, 0x0, &(0x7f0000000240)=""/45, 0x2d}}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7cf51b20, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x1, 0x1, 0xb, 0xb, 0x18, 0xfffffffffffffff0}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x63, &(0x7f0000000080)=""/99, 0x41100, 0x1, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0xb, 0x5, 0x3}, 0x10, r0, r1, 0x8, &(0x7f0000000600)=[r2, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5], &(0x7f0000000640)=[{0x4, 0x1, 0x8, 0x9}, {0x5, 0x4, 0xa}, {0x3, 0x5, 0xc, 0x7}, {0x2, 0x5, 0x9}, {0x4, 0x4, 0x9, 0x6}, {0x2, 0x3, 0x8, 0x2}, {0x4, 0x1, 0x2, 0x4}, {0x4, 0x5, 0xe, 0x7}], 0x10, 0x1f24}, 0x90) 02:27:33 executing program 1: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000180)=""/175, 0xaf, 0x0, &(0x7f0000000240)=""/45, 0x2d}}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7cf51b20, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x1, 0x1, 0xb, 0xb, 0x18, 0xfffffffffffffff0}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x63, &(0x7f0000000080)=""/99, 0x41100, 0x1, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0xb, 0x5, 0x3}, 0x10, r0, r1, 0x8, &(0x7f0000000600)=[r2, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5], &(0x7f0000000640)=[{0x4, 0x1, 0x8, 0x9}, {0x5, 0x4, 0xa}, {0x3, 0x5, 0xc, 0x7}, {0x2, 0x5, 0x9}, {0x4, 0x4, 0x9, 0x6}, {0x2, 0x3, 0x8, 0x2}, {0x4, 0x1, 0x2, 0x4}, {0x4, 0x5, 0xe, 0x7}], 0x10, 0x1f24}, 0x90) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000180)=""/175, 0xaf, 0x0, &(0x7f0000000240)=""/45, 0x2d}}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{}, &(0x7f0000000480), &(0x7f00000004c0)='%-5lx \x00'}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7cf51b20, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x1, 0x1, 0xb, 0xb, 0x18, 0xfffffffffffffff0}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x63, &(0x7f0000000080)=""/99, 0x41100, 0x1, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0xb, 0x5, 0x3}, 0x10, r0, r1, 0x8, &(0x7f0000000600)=[r2, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5], &(0x7f0000000640)=[{0x4, 0x1, 0x8, 0x9}, {0x5, 0x4, 0xa}, {0x3, 0x5, 0xc, 0x7}, {0x2, 0x5, 0x9}, {0x4, 0x4, 0x9, 0x6}, {0x2, 0x3, 0x8, 0x2}, {0x4, 0x1, 0x2, 0x4}, {0x4, 0x5, 0xe, 0x7}], 0x10, 0x1f24}, 0x90) (async) 02:27:34 executing program 1: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000180)=""/175, 0xaf, 0x0, &(0x7f0000000240)=""/45, 0x2d}}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7cf51b20, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x1, 0x1, 0xb, 0xb, 0x18, 0xfffffffffffffff0}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x63, &(0x7f0000000080)=""/99, 0x41100, 0x1, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0xb, 0x5, 0x3}, 0x10, r0, r1, 0x8, &(0x7f0000000600)=[r2, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5], &(0x7f0000000640)=[{0x4, 0x1, 0x8, 0x9}, {0x5, 0x4, 0xa}, {0x3, 0x5, 0xc, 0x7}, {0x2, 0x5, 0x9}, {0x4, 0x4, 0x9, 0x6}, {0x2, 0x3, 0x8, 0x2}, {0x4, 0x1, 0x2, 0x4}, {0x4, 0x5, 0xe, 0x7}], 0x10, 0x1f24}, 0x90) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000180)=""/175, 0xaf, 0x0, &(0x7f0000000240)=""/45, 0x2d}}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0), 0x4) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{}, &(0x7f0000000480), &(0x7f00000004c0)='%-5lx \x00'}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7cf51b20, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x1, 0x1, 0xb, 0xb, 0x18, 0xfffffffffffffff0}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x63, &(0x7f0000000080)=""/99, 0x41100, 0x1, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0xb, 0x5, 0x3}, 0x10, r0, r1, 0x8, &(0x7f0000000600)=[r2, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5], &(0x7f0000000640)=[{0x4, 0x1, 0x8, 0x9}, {0x5, 0x4, 0xa}, {0x3, 0x5, 0xc, 0x7}, {0x2, 0x5, 0x9}, {0x4, 0x4, 0x9, 0x6}, {0x2, 0x3, 0x8, 0x2}, {0x4, 0x1, 0x2, 0x4}, {0x4, 0x5, 0xe, 0x7}], 0x10, 0x1f24}, 0x90) (async) 02:27:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000001500)={'erspan0\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'geneve0\x00'}) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) openat$cgroup_devices(r1, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) [ 790.022692][T17839] Bluetooth: hci0: command 0x0406 tx timeout [ 790.023143][T17215] Bluetooth: hci3: command 0x0406 tx timeout [ 790.053213][T17215] Bluetooth: hci1: command 0x0406 tx timeout 02:27:35 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:35 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:36 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:37 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:37 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:38 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000001500)={'erspan0\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'geneve0\x00'}) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) openat$cgroup_devices(r1, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000001500)={'erspan0\x00'}) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'geneve0\x00'}) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) (async) openat$cgroup_devices(r1, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) (async) [ 794.095377][T20785] team0: Port device team_slave_0 added [ 794.124749][T20785] team0: Port device team_slave_1 added 02:27:39 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:40 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 796.153112][T20785] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 796.160099][T20785] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 796.255789][T20785] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 02:27:41 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:41 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:42 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r3, r4, r3, r3, r3], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:42 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:42 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:44 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r3, r4, r3, r3, r3], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:45 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:46 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000001500)={'erspan0\x00'}) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'geneve0\x00'}) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) (async) openat$cgroup_devices(r1, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) [ 803.163520][T20785] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 803.170504][T20785] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 803.290197][T20785] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 02:27:47 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81}, [@ldst={0x2, 0x2, 0x0, 0x5, 0x9, 0x1, 0x8}, @func]}, &(0x7f0000000380)='syzkaller\x00', 0x1ff, 0xb1, &(0x7f00000003c0)=""/177, 0x41100, 0x44, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xc, 0x6, 0x1}, 0x10, 0xc58a, 0xffffffffffffffff, 0x3, &(0x7f0000000500)=[0x1, 0x1], &(0x7f0000000540)=[{0x4, 0x1, 0x9, 0x4}, {0x1, 0x2, 0xf, 0xa}, {0x2, 0x5, 0xf}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@ifindex=r0, r1, 0x28, 0x24, 0x0, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:47 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:47 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:47 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r3, r4, r3, r3, r3], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:47 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81}, [@ldst={0x2, 0x2, 0x0, 0x5, 0x9, 0x1, 0x8}, @func]}, &(0x7f0000000380)='syzkaller\x00', 0x1ff, 0xb1, &(0x7f00000003c0)=""/177, 0x41100, 0x44, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xc, 0x6, 0x1}, 0x10, 0xc58a, 0xffffffffffffffff, 0x3, &(0x7f0000000500)=[0x1, 0x1], &(0x7f0000000540)=[{0x4, 0x1, 0x9, 0x4}, {0x1, 0x2, 0xf, 0xa}, {0x2, 0x5, 0xf}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@ifindex=r0, r1, 0x28, 0x24, 0x0, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81}, [@ldst={0x2, 0x2, 0x0, 0x5, 0x9, 0x1, 0x8}, @func]}, &(0x7f0000000380)='syzkaller\x00', 0x1ff, 0xb1, &(0x7f00000003c0)=""/177, 0x41100, 0x44, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xc, 0x6, 0x1}, 0x10, 0xc58a, 0xffffffffffffffff, 0x3, &(0x7f0000000500)=[0x1, 0x1], &(0x7f0000000540)=[{0x4, 0x1, 0x9, 0x4}, {0x1, 0x2, 0xf, 0xa}, {0x2, 0x5, 0xf}], 0x10, 0x3}, 0x90) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@ifindex=r0, r1, 0x28, 0x24, 0x0, @prog_id}, 0x20) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) 02:27:48 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81}, [@ldst={0x2, 0x2, 0x0, 0x5, 0x9, 0x1, 0x8}, @func]}, &(0x7f0000000380)='syzkaller\x00', 0x1ff, 0xb1, &(0x7f00000003c0)=""/177, 0x41100, 0x44, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xc, 0x6, 0x1}, 0x10, 0xc58a, 0xffffffffffffffff, 0x3, &(0x7f0000000500)=[0x1, 0x1], &(0x7f0000000540)=[{0x4, 0x1, 0x9, 0x4}, {0x1, 0x2, 0xf, 0xa}, {0x2, 0x5, 0xf}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@ifindex=r0, r1, 0x28, 0x24, 0x0, @prog_id}, 0x20) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:48 executing program 1: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000080)={0x0, 0x80, 0x0, 0x1, 0x6, 0x7f, 0x0, 0x0, 0x20002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x6, 0x8}, 0x4003, 0x4, 0x4, 0x2, 0x4, 0x6, 0x3f, 0x0, 0x81, 0x0, 0x6}) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xe019}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) 02:27:48 executing program 1: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000080)={0x0, 0x80, 0x0, 0x1, 0x6, 0x7f, 0x0, 0x0, 0x20002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x6, 0x8}, 0x4003, 0x4, 0x4, 0x2, 0x4, 0x6, 0x3f, 0x0, 0x81, 0x0, 0x6}) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xe019}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) 02:27:48 executing program 1: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000080)={0x0, 0x80, 0x0, 0x1, 0x6, 0x7f, 0x0, 0x0, 0x20002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x6, 0x8}, 0x4003, 0x4, 0x4, 0x2, 0x4, 0x6, 0x3f, 0x0, 0x81, 0x0, 0x6}) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xe019}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000080)={0x0, 0x80, 0x0, 0x1, 0x6, 0x7f, 0x0, 0x0, 0x20002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x6, 0x8}, 0x4003, 0x4, 0x4, 0x2, 0x4, 0x6, 0x3f, 0x0, 0x81, 0x0, 0x6}) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xe019}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) (async) 02:27:48 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 02:27:48 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 02:27:48 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 02:27:49 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xdad4) 02:27:49 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xdad4) 02:27:49 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xdad4) 02:27:49 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x42}, 0x8002}, 0xffffffffffffffff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) 02:27:49 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:49 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x42}, 0x8002}, 0xffffffffffffffff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) 02:27:49 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x42}, 0x8002}, 0xffffffffffffffff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x42}, 0x8002}, 0xffffffffffffffff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) (async) 02:27:49 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x2, 0x80, 0x3f, 0x20, 0xdc, 0x0, 0x0, 0x8, 0x28b08, 0xe, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd43, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x400, 0x4, 0x9, 0x0, 0xa7a2, 0x5, 0x4e, 0x0, 0x7, 0x0, 0x80000000}) 02:27:49 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x2, 0x80, 0x3f, 0x20, 0xdc, 0x0, 0x0, 0x8, 0x28b08, 0xe, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd43, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x400, 0x4, 0x9, 0x0, 0xa7a2, 0x5, 0x4e, 0x0, 0x7, 0x0, 0x80000000}) 02:27:50 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x2, 0x80, 0x3f, 0x20, 0xdc, 0x0, 0x0, 0x8, 0x28b08, 0xe, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd43, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x400, 0x4, 0x9, 0x0, 0xa7a2, 0x5, 0x4e, 0x0, 0x7, 0x0, 0x80000000}) 02:27:50 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:50 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) 02:27:50 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:50 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) 02:27:50 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) (async) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) 02:27:50 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) (async) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) (async) 02:27:50 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080)}, 0x8002, 0xfffffffffffffffc, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x0) 02:27:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080)}, 0x8002, 0xfffffffffffffffc, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x0) 02:27:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080)}, 0x8002, 0xfffffffffffffffc, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x0) 02:27:51 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:51 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)='%-010d \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000000)='./file0\x00', r0}, 0x18) perf_event_open$cgroup(&(0x7f00000021c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000001c0)='cgroup.freeze\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000140), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'rdma'}, {0x2b, 'perf_event'}, {0x2d, 'cpuacct'}, {0x2d, 'cpu'}, {0x2b, 'cpuset'}, {0x2b, 'cpuacct'}]}, 0x31) [ 806.973981][T20785] device hsr_slave_0 entered promiscuous mode 02:27:51 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)='%-010d \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000000)='./file0\x00', r0}, 0x18) perf_event_open$cgroup(&(0x7f00000021c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000001c0)='cgroup.freeze\x00', 0x0, 0x0) (async) openat$cgroup_ro(r1, &(0x7f00000001c0)='cgroup.freeze\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000140), 0x2, 0x0) (async) r2 = openat$cgroup_subtree(r1, &(0x7f0000000140), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'rdma'}, {0x2b, 'perf_event'}, {0x2d, 'cpuacct'}, {0x2d, 'cpu'}, {0x2b, 'cpuset'}, {0x2b, 'cpuacct'}]}, 0x31) 02:27:51 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r3, r4, r3, r3, r3], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:51 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)='%-010d \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000000)='./file0\x00', r0}, 0x18) (async, rerun: 64) perf_event_open$cgroup(&(0x7f00000021c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000001c0)='cgroup.freeze\x00', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000140), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'rdma'}, {0x2b, 'perf_event'}, {0x2d, 'cpuacct'}, {0x2d, 'cpu'}, {0x2b, 'cpuset'}, {0x2b, 'cpuacct'}]}, 0x31) 02:27:51 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map=0x1, 0x22, 0x1, 0x20, &(0x7f0000000100)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r1, r0, 0x28, 0x10, r2, @link_fd=r3, r4}, 0x20) 02:27:51 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) (async) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map=0x1, 0x22, 0x1, 0x20, &(0x7f0000000100)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r1, r0, 0x28, 0x10, r2, @link_fd=r3, r4}, 0x20) 02:27:51 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map=0x1, 0x22, 0x1, 0x20, &(0x7f0000000100)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r1, r0, 0x28, 0x10, r2, @link_fd=r3, r4}, 0x20) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0), 0x4) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map=0x1, 0x22, 0x1, 0x20, &(0x7f0000000100)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r1, r0, 0x28, 0x10, r2, @link_fd=r3, r4}, 0x20) (async) [ 807.621863][T20785] device hsr_slave_1 entered promiscuous mode 02:27:52 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = syz_clone(0xd5a1f082221ff77b, &(0x7f0000000180)="49a1c4a413d8d310f7fba241dad56c849cafe8", 0x13, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="56ed66ffc16487f9fd53fe8b10858b7584ef67c20beb1c16a1e06b49ad3e70169126752d3d45524dc3de541af7a1e9295e8cedbcb753eaab73d229ec7302ff053642e660e9e11d61245f4eb24224f7a163587083f6d64ee626611d96f71dc02e530ae5a91ce599eb89464f7693729414d6ee75108e2cc2b714191ae7570731b6bca0258df32d101a94e7b1b728a38dc5ee130e33e9d894088c92fa3b5b74a563100a28a2afc65bc9cf797d326c122d2b15b1434e") r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x101, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000004c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@func={0x2, 0x0, 0x0, 0xc, 0x5}, @var={0x2, 0x0, 0x0, 0xe, 0x5, 0x1}, @struct={0xc, 0x3, 0x0, 0x4, 0x1, 0xe2, [{0xf, 0x3, 0x80000001}, {0xc}, {0x6, 0x0, 0x80000001}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x2}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x8, [{0xf, 0x4, 0x8}, {0x6, 0x2, 0x3}, {0x7, 0x2, 0x1f}, {0xb, 0x3, 0x2}, {0x2, 0x5, 0xfff}, {0xa, 0x2, 0x7f}]}]}, {0x0, [0x0, 0x2e, 0x30, 0x0, 0x30, 0x30]}}, &(0x7f0000000800)=""/143, 0xcc, 0x8f, 0x1, 0x277}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x0, '\x00', r3, r4, 0x2, 0x0, 0x4}, 0x48) r5 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x1, 0x99, 0xfe, 0x0, 0x0, 0x20100, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x101, 0x2, @perf_bp={&(0x7f00000000c0), 0x2}, 0x100, 0xff, 0x3ff, 0x0, 0x8, 0x10001, 0xca, 0x0, 0x200, 0x0, 0xf5}, r1, 0x6, r0, 0x10) r6 = gettid() perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x9, 0x3f, 0x7, 0x5, 0x0, 0x8000000000000000, 0x3050a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x24dc, 0x9}, 0x18502, 0x3, 0x8, 0x3, 0x7fffffff, 0x3d5, 0x0, 0x0, 0x6d10db42, 0x0, 0x7}, r6, 0x9, r5, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r6, r0, 0x0, 0x5, &(0x7f0000000040)='\x16\xb7{\xd8\x00'}, 0x30) 02:27:52 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = syz_clone(0xd5a1f082221ff77b, &(0x7f0000000180)="49a1c4a413d8d310f7fba241dad56c849cafe8", 0x13, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="56ed66ffc16487f9fd53fe8b10858b7584ef67c20beb1c16a1e06b49ad3e70169126752d3d45524dc3de541af7a1e9295e8cedbcb753eaab73d229ec7302ff053642e660e9e11d61245f4eb24224f7a163587083f6d64ee626611d96f71dc02e530ae5a91ce599eb89464f7693729414d6ee75108e2cc2b714191ae7570731b6bca0258df32d101a94e7b1b728a38dc5ee130e33e9d894088c92fa3b5b74a563100a28a2afc65bc9cf797d326c122d2b15b1434e") r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x101, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000004c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@func={0x2, 0x0, 0x0, 0xc, 0x5}, @var={0x2, 0x0, 0x0, 0xe, 0x5, 0x1}, @struct={0xc, 0x3, 0x0, 0x4, 0x1, 0xe2, [{0xf, 0x3, 0x80000001}, {0xc}, {0x6, 0x0, 0x80000001}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x2}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x8, [{0xf, 0x4, 0x8}, {0x6, 0x2, 0x3}, {0x7, 0x2, 0x1f}, {0xb, 0x3, 0x2}, {0x2, 0x5, 0xfff}, {0xa, 0x2, 0x7f}]}]}, {0x0, [0x0, 0x2e, 0x30, 0x0, 0x30, 0x30]}}, &(0x7f0000000800)=""/143, 0xcc, 0x8f, 0x1, 0x277}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x0, '\x00', r3, r4, 0x2, 0x0, 0x4}, 0x48) r5 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x1, 0x99, 0xfe, 0x0, 0x0, 0x20100, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x101, 0x2, @perf_bp={&(0x7f00000000c0), 0x2}, 0x100, 0xff, 0x3ff, 0x0, 0x8, 0x10001, 0xca, 0x0, 0x200, 0x0, 0xf5}, r1, 0x6, r0, 0x10) r6 = gettid() perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x9, 0x3f, 0x7, 0x5, 0x0, 0x8000000000000000, 0x3050a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x24dc, 0x9}, 0x18502, 0x3, 0x8, 0x3, 0x7fffffff, 0x3d5, 0x0, 0x0, 0x6d10db42, 0x0, 0x7}, r6, 0x9, r5, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r6, r0, 0x0, 0x5, &(0x7f0000000040)='\x16\xb7{\xd8\x00'}, 0x30) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) (async) syz_clone(0xd5a1f082221ff77b, &(0x7f0000000180)="49a1c4a413d8d310f7fba241dad56c849cafe8", 0x13, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="56ed66ffc16487f9fd53fe8b10858b7584ef67c20beb1c16a1e06b49ad3e70169126752d3d45524dc3de541af7a1e9295e8cedbcb753eaab73d229ec7302ff053642e660e9e11d61245f4eb24224f7a163587083f6d64ee626611d96f71dc02e530ae5a91ce599eb89464f7693729414d6ee75108e2cc2b714191ae7570731b6bca0258df32d101a94e7b1b728a38dc5ee130e33e9d894088c92fa3b5b74a563100a28a2afc65bc9cf797d326c122d2b15b1434e") (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x101, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000004c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@func={0x2, 0x0, 0x0, 0xc, 0x5}, @var={0x2, 0x0, 0x0, 0xe, 0x5, 0x1}, @struct={0xc, 0x3, 0x0, 0x4, 0x1, 0xe2, [{0xf, 0x3, 0x80000001}, {0xc}, {0x6, 0x0, 0x80000001}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x2}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x8, [{0xf, 0x4, 0x8}, {0x6, 0x2, 0x3}, {0x7, 0x2, 0x1f}, {0xb, 0x3, 0x2}, {0x2, 0x5, 0xfff}, {0xa, 0x2, 0x7f}]}]}, {0x0, [0x0, 0x2e, 0x30, 0x0, 0x30, 0x30]}}, &(0x7f0000000800)=""/143, 0xcc, 0x8f, 0x1, 0x277}, 0x20) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x0, '\x00', r3, r4, 0x2, 0x0, 0x4}, 0x48) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x1, 0x99, 0xfe, 0x0, 0x0, 0x20100, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x101, 0x2, @perf_bp={&(0x7f00000000c0), 0x2}, 0x100, 0xff, 0x3ff, 0x0, 0x8, 0x10001, 0xca, 0x0, 0x200, 0x0, 0xf5}, r1, 0x6, r0, 0x10) (async) gettid() (async) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x9, 0x3f, 0x7, 0x5, 0x0, 0x8000000000000000, 0x3050a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x24dc, 0x9}, 0x18502, 0x3, 0x8, 0x3, 0x7fffffff, 0x3d5, 0x0, 0x0, 0x6d10db42, 0x0, 0x7}, r6, 0x9, r5, 0x2) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r6, r0, 0x0, 0x5, &(0x7f0000000040)='\x16\xb7{\xd8\x00'}, 0x30) (async) 02:27:52 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) (async) r1 = syz_clone(0xd5a1f082221ff77b, &(0x7f0000000180)="49a1c4a413d8d310f7fba241dad56c849cafe8", 0x13, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="56ed66ffc16487f9fd53fe8b10858b7584ef67c20beb1c16a1e06b49ad3e70169126752d3d45524dc3de541af7a1e9295e8cedbcb753eaab73d229ec7302ff053642e660e9e11d61245f4eb24224f7a163587083f6d64ee626611d96f71dc02e530ae5a91ce599eb89464f7693729414d6ee75108e2cc2b714191ae7570731b6bca0258df32d101a94e7b1b728a38dc5ee130e33e9d894088c92fa3b5b74a563100a28a2afc65bc9cf797d326c122d2b15b1434e") (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x101, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000004c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) (async) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@func={0x2, 0x0, 0x0, 0xc, 0x5}, @var={0x2, 0x0, 0x0, 0xe, 0x5, 0x1}, @struct={0xc, 0x3, 0x0, 0x4, 0x1, 0xe2, [{0xf, 0x3, 0x80000001}, {0xc}, {0x6, 0x0, 0x80000001}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x2}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x8, [{0xf, 0x4, 0x8}, {0x6, 0x2, 0x3}, {0x7, 0x2, 0x1f}, {0xb, 0x3, 0x2}, {0x2, 0x5, 0xfff}, {0xa, 0x2, 0x7f}]}]}, {0x0, [0x0, 0x2e, 0x30, 0x0, 0x30, 0x30]}}, &(0x7f0000000800)=""/143, 0xcc, 0x8f, 0x1, 0x277}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x0, '\x00', r3, r4, 0x2, 0x0, 0x4}, 0x48) (async) r5 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x1, 0x99, 0xfe, 0x0, 0x0, 0x20100, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x101, 0x2, @perf_bp={&(0x7f00000000c0), 0x2}, 0x100, 0xff, 0x3ff, 0x0, 0x8, 0x10001, 0xca, 0x0, 0x200, 0x0, 0xf5}, r1, 0x6, r0, 0x10) (async) r6 = gettid() perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x9, 0x3f, 0x7, 0x5, 0x0, 0x8000000000000000, 0x3050a, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x24dc, 0x9}, 0x18502, 0x3, 0x8, 0x3, 0x7fffffff, 0x3d5, 0x0, 0x0, 0x6d10db42, 0x0, 0x7}, r6, 0x9, r5, 0x2) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r6, r0, 0x0, 0x5, &(0x7f0000000040)='\x16\xb7{\xd8\x00'}, 0x30) 02:27:52 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:52 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000000)) [ 808.425741][ T1378] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.432081][ T1378] ieee802154 phy1 wpan1: encryption failed: -22 [ 808.493723][T20785] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 808.508149][T20785] Cannot create hsr debugfs directory 02:27:52 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000000)) 02:27:53 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:54 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) (async) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000000)) 02:27:54 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0xfffffffffffffffc, 0x0, 0x0, 0x4, 0xc22}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:54 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0xfffffffffffffffc, 0x0, 0x0, 0x4, 0xc22}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0xfffffffffffffffc, 0x0, 0x0, 0x4, 0xc22}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) 02:27:54 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0xfffffffffffffffc, 0x0, 0x0, 0x4, 0xc22}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0xfffffffffffffffc, 0x0, 0x0, 0x4, 0xc22}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) 02:27:54 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000000c0)={0x1, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@cgroup=r0, 0x2f, 0x0, 0x80, &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000140)=[0x0], &(0x7f0000000180), &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r0, 0xffffffffffffffff, 0x26, 0x2008, 0x0, @link_id=r1, r2}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x8, 0x1, 0x1f, 0x8, 0x0, 0x8000, 0x3448, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x15, 0x8, 0x2, 0x7, 0x1, 0x330, 0x6246, 0x0, 0x8ba, 0x0, 0x5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:54 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:55 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000000c0)={0x1, 0x0}, 0x8) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@cgroup=r0, 0x2f, 0x0, 0x80, &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000140)=[0x0], &(0x7f0000000180), &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r0, 0xffffffffffffffff, 0x26, 0x2008, 0x0, @link_id=r1, r2}, 0x20) (async) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x8, 0x1, 0x1f, 0x8, 0x0, 0x8000, 0x3448, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x15, 0x8, 0x2, 0x7, 0x1, 0x330, 0x6246, 0x0, 0x8ba, 0x0, 0x5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:55 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r3, r4, r3, r3, r3], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:55 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000000c0)={0x1, 0x0}, 0x8) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@cgroup=r0, 0x2f, 0x0, 0x80, &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000140)=[0x0], &(0x7f0000000180), &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r0, 0xffffffffffffffff, 0x26, 0x2008, 0x0, @link_id=r1, r2}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x8, 0x1, 0x1f, 0x8, 0x0, 0x8000, 0x3448, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x15, 0x8, 0x2, 0x7, 0x1, 0x330, 0x6246, 0x0, 0x8ba, 0x0, 0x5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) (async, rerun: 64) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) 02:27:55 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000140)}, 0x8002, 0x0, 0x0, 0x0, 0xf31, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0xffffffffffffffff, 0x400000000000000, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000100)='%pI4 \x00'}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@map=r1, 0xe, 0x1, 0x810, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 02:27:55 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000140)}, 0x8002, 0x0, 0x0, 0x0, 0xf31, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0xffffffffffffffff, 0x400000000000000, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000100)='%pI4 \x00'}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@map=r1, 0xe, 0x1, 0x810, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) (async) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000140)}, 0x8002, 0x0, 0x0, 0x0, 0xf31, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0xffffffffffffffff, 0x400000000000000, 0xffffffffffffffff, 0x0) (async) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1}, &(0x7f0000000080), &(0x7f0000000100)='%pI4 \x00'}, 0x20) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@map=r1, 0xe, 0x1, 0x810, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) 02:27:55 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000140)}, 0x8002, 0x0, 0x0, 0x0, 0xf31, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0xffffffffffffffff, 0x400000000000000, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000100)='%pI4 \x00'}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@map=r1, 0xe, 0x1, 0x810, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) (async) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000140)}, 0x8002, 0x0, 0x0, 0x0, 0xf31, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0xffffffffffffffff, 0x400000000000000, 0xffffffffffffffff, 0x0) (async) openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1}, &(0x7f0000000080), &(0x7f0000000100)='%pI4 \x00'}, 0x20) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@map=r1, 0xe, 0x1, 0x810, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) 02:27:55 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext, 0x8002, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x100000, 0x0, 0x4}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='net_prio.ifpriomap\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x19, 0xc, &(0x7f0000000100)=@raw=[@map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xca2a}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x6}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x9}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x2}], &(0x7f0000000180)='syzkaller\x00', 0x9, 0x56, &(0x7f00000001c0)=""/86, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xc, 0x27, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xa96}, {}, {}, [@jmp={0x5, 0x1, 0x7, 0x3, 0xb, 0xc, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf92}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x90}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='GPL\x00', 0xff, 0x0, 0x0, 0x41100, 0x95, '\x00', 0x0, 0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x2, 0x4, 0x101, 0x5354}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x1ff}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0x11, &(0x7f0000000340)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0xb}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x45}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @exit], &(0x7f0000000400)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x33, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r3, 0x5, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x4, 0x5, 0x400000}, {0x5, 0x1, 0x9, 0x2}, {0x4, 0x1, 0x10, 0x2}, {0x3, 0x2, 0xa, 0x5}, {0x5, 0x1, 0xc, 0x5}], 0x10, 0x8}, 0x90) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000005c0), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@cgroup=r1, 0xe, 0x1, 0x1, &(0x7f0000000600)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000740)={@cgroup=r1, r2, 0x6, 0x10, r4, @link_fd=r5, r6}, 0x20) openat$cgroup(r1, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) close(r1) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000a80)=r3) 02:27:55 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext, 0x8002, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x100000, 0x0, 0x4}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='net_prio.ifpriomap\x00') (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x19, 0xc, &(0x7f0000000100)=@raw=[@map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xca2a}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x6}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x9}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x2}], &(0x7f0000000180)='syzkaller\x00', 0x9, 0x56, &(0x7f00000001c0)=""/86, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xc, 0x27, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xa96}, {}, {}, [@jmp={0x5, 0x1, 0x7, 0x3, 0xb, 0xc, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf92}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x90}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='GPL\x00', 0xff, 0x0, 0x0, 0x41100, 0x95, '\x00', 0x0, 0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x2, 0x4, 0x101, 0x5354}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x1ff}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0x11, &(0x7f0000000340)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0xb}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x45}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @exit], &(0x7f0000000400)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x33, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r3, 0x5, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x4, 0x5, 0x400000}, {0x5, 0x1, 0x9, 0x2}, {0x4, 0x1, 0x10, 0x2}, {0x3, 0x2, 0xa, 0x5}, {0x5, 0x1, 0xc, 0x5}], 0x10, 0x8}, 0x90) (async) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000005c0), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@cgroup=r1, 0xe, 0x1, 0x1, &(0x7f0000000600)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000740)={@cgroup=r1, r2, 0x6, 0x10, r4, @link_fd=r5, r6}, 0x20) (async) openat$cgroup(r1, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) (async) close(r1) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000a80)=r3) 02:27:55 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext, 0x8002, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x100000, 0x0, 0x4}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='net_prio.ifpriomap\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x19, 0xc, &(0x7f0000000100)=@raw=[@map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xca2a}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x6}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x9}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x2}], &(0x7f0000000180)='syzkaller\x00', 0x9, 0x56, &(0x7f00000001c0)=""/86, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xc, 0x27, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xa96}, {}, {}, [@jmp={0x5, 0x1, 0x7, 0x3, 0xb, 0xc, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf92}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x90}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='GPL\x00', 0xff, 0x0, 0x0, 0x41100, 0x95, '\x00', 0x0, 0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x2, 0x4, 0x101, 0x5354}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x1ff}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0x11, &(0x7f0000000340)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0xb}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x45}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @exit], &(0x7f0000000400)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x33, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r3, 0x5, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x4, 0x5, 0x400000}, {0x5, 0x1, 0x9, 0x2}, {0x4, 0x1, 0x10, 0x2}, {0x3, 0x2, 0xa, 0x5}, {0x5, 0x1, 0xc, 0x5}], 0x10, 0x8}, 0x90) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000005c0), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@cgroup=r1, 0xe, 0x1, 0x1, &(0x7f0000000600)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000740)={@cgroup=r1, r2, 0x6, 0x10, r4, @link_fd=r5, r6}, 0x20) openat$cgroup(r1, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) close(r1) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000a80)=r3) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext, 0x8002, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x100000, 0x0, 0x4}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) (async) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='net_prio.ifpriomap\x00') (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x19, 0xc, &(0x7f0000000100)=@raw=[@map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xca2a}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x6}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x9}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x2}], &(0x7f0000000180)='syzkaller\x00', 0x9, 0x56, &(0x7f00000001c0)=""/86, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xc, 0x27, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xa96}, {}, {}, [@jmp={0x5, 0x1, 0x7, 0x3, 0xb, 0xc, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf92}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x90}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='GPL\x00', 0xff, 0x0, 0x0, 0x41100, 0x95, '\x00', 0x0, 0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x2, 0x4, 0x101, 0x5354}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x1ff}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0x11, &(0x7f0000000340)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0xb}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x45}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @exit], &(0x7f0000000400)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x33, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r3, 0x5, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x4, 0x5, 0x400000}, {0x5, 0x1, 0x9, 0x2}, {0x4, 0x1, 0x10, 0x2}, {0x3, 0x2, 0xa, 0x5}, {0x5, 0x1, 0xc, 0x5}], 0x10, 0x8}, 0x90) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000005c0), 0x4) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@cgroup=r1, 0xe, 0x1, 0x1, &(0x7f0000000600)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000740)={@cgroup=r1, r2, 0x6, 0x10, r4, @link_fd=r5, r6}, 0x20) (async) openat$cgroup(r1, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) (async) close(r1) (async) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000a80)=r3) (async) 02:27:55 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0xb, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 02:27:56 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0xb, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 02:27:56 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002, 0x0, 0x0, 0xb, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 02:27:56 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000140)={0x4, 0x80, 0x80, 0x10, 0x5, 0x3b, 0x0, 0x3, 0x100, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0x0, 0xfffffffffffffe03}, 0x400, 0x1, 0x3, 0x0, 0x7, 0x81, 0x81, 0x0, 0x1, 0x0, 0xba9c}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xc) r2 = perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x1, 0x3, 0x3f, 0x0, 0x8, 0x202, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2280000, 0x2, @perf_bp={&(0x7f0000000040), 0xb}, 0xa04e, 0x6, 0x7fffffff, 0x5, 0x40, 0x8001, 0x308d, 0x0, 0x1, 0x0, 0x6}, r0, 0x8, r1, 0xa) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)=@generic={&(0x7f0000000200)='./file0\x00'}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1a, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffff00008500000006000000688510000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000030000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500009b65000085000000a5000000"], &(0x7f0000000380)='syzkaller\x00', 0x4, 0x10, &(0x7f00000003c0)=""/16, 0x41000, 0x63, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xe, 0x10940269, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x4}, 0x90) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000580), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@map=0x1, 0x26, 0x0, 0x9, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r3, r1, 0x25, 0x1, r4, @link_fd=r5, r7}, 0x20) r8 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x28e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c00)=0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000000)='.j\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000b80)={0x4, 0x80, 0x6, 0x2, 0x10, 0x81, 0x0, 0x0, 0x1020, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000b40), 0x4}, 0x1000, 0x5, 0x6, 0x9, 0x6, 0x6636, 0x6, 0x0, 0xffffd889, 0x0, 0x98}) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0x20, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_tracing={0x1a, 0x25, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@alu={0x4, 0x0, 0xa, 0xa, 0x3, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x47eb}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000880)='syzkaller\x00', 0x1000, 0x75, &(0x7f00000008c0)=""/117, 0x41100, 0x2, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x7f}, 0x8, 0x10, &(0x7f0000000980)={0x2, 0x4, 0x7, 0x1}, 0x10, 0x198a8, r4, 0x3, &(0x7f0000000a00)=[r3, r6, r3, r6, r9, r3, r3, r3, r3], &(0x7f0000000a40)=[{0x2, 0x3, 0x6, 0x6}, {0x3, 0x4, 0xc, 0x3}, {0x4, 0x1, 0xc, 0x7}], 0x10, 0x7}, 0x90) mkdirat$cgroup(r0, &(0x7f00000001c0)='syz0\x00', 0x1ff) 02:27:56 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) r1 = perf_event_open$cgroup(&(0x7f0000000140)={0x4, 0x80, 0x80, 0x10, 0x5, 0x3b, 0x0, 0x3, 0x100, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0x0, 0xfffffffffffffe03}, 0x400, 0x1, 0x3, 0x0, 0x7, 0x81, 0x81, 0x0, 0x1, 0x0, 0xba9c}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xc) r2 = perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x1, 0x3, 0x3f, 0x0, 0x8, 0x202, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2280000, 0x2, @perf_bp={&(0x7f0000000040), 0xb}, 0xa04e, 0x6, 0x7fffffff, 0x5, 0x40, 0x8001, 0x308d, 0x0, 0x1, 0x0, 0x6}, r0, 0x8, r1, 0xa) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)=@generic={&(0x7f0000000200)='./file0\x00'}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1a, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffff00008500000006000000688510000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000030000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500009b65000085000000a5000000"], &(0x7f0000000380)='syzkaller\x00', 0x4, 0x10, &(0x7f00000003c0)=""/16, 0x41000, 0x63, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xe, 0x10940269, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x4}, 0x90) (async, rerun: 32) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000580), 0x4) (async, rerun: 32) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@map=0x1, 0x26, 0x0, 0x9, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r3, r1, 0x25, 0x1, r4, @link_fd=r5, r7}, 0x20) (async) r8 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x28e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c00)=0x6) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000000)='.j\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000b80)={0x4, 0x80, 0x6, 0x2, 0x10, 0x81, 0x0, 0x0, 0x1020, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000b40), 0x4}, 0x1000, 0x5, 0x6, 0x9, 0x6, 0x6636, 0x6, 0x0, 0xffffd889, 0x0, 0x98}) (async) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0x20, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_tracing={0x1a, 0x25, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@alu={0x4, 0x0, 0xa, 0xa, 0x3, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x47eb}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000880)='syzkaller\x00', 0x1000, 0x75, &(0x7f00000008c0)=""/117, 0x41100, 0x2, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x7f}, 0x8, 0x10, &(0x7f0000000980)={0x2, 0x4, 0x7, 0x1}, 0x10, 0x198a8, r4, 0x3, &(0x7f0000000a00)=[r3, r6, r3, r6, r9, r3, r3, r3, r3], &(0x7f0000000a40)=[{0x2, 0x3, 0x6, 0x6}, {0x3, 0x4, 0xc, 0x3}, {0x4, 0x1, 0xc, 0x7}], 0x10, 0x7}, 0x90) (async) mkdirat$cgroup(r0, &(0x7f00000001c0)='syz0\x00', 0x1ff) 02:27:56 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) r1 = perf_event_open$cgroup(&(0x7f0000000140)={0x4, 0x80, 0x80, 0x10, 0x5, 0x3b, 0x0, 0x3, 0x100, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0x0, 0xfffffffffffffe03}, 0x400, 0x1, 0x3, 0x0, 0x7, 0x81, 0x81, 0x0, 0x1, 0x0, 0xba9c}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xc) r2 = perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x1, 0x3, 0x3f, 0x0, 0x8, 0x202, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2280000, 0x2, @perf_bp={&(0x7f0000000040), 0xb}, 0xa04e, 0x6, 0x7fffffff, 0x5, 0x40, 0x8001, 0x308d, 0x0, 0x1, 0x0, 0x6}, r0, 0x8, r1, 0xa) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)=@generic={&(0x7f0000000200)='./file0\x00'}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1a, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffff00008500000006000000688510000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000030000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500009b65000085000000a5000000"], &(0x7f0000000380)='syzkaller\x00', 0x4, 0x10, &(0x7f00000003c0)=""/16, 0x41000, 0x63, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xe, 0x10940269, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x4}, 0x90) (async) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000580), 0x4) (async, rerun: 64) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@map=0x1, 0x26, 0x0, 0x9, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (rerun: 64) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@map=r3, r1, 0x25, 0x1, r4, @link_fd=r5, r7}, 0x20) (async, rerun: 64) r8 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x28e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) (rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c00)=0x6) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000000)='.j\x00') (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000b80)={0x4, 0x80, 0x6, 0x2, 0x10, 0x81, 0x0, 0x0, 0x1020, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000b40), 0x4}, 0x1000, 0x5, 0x6, 0x9, 0x6, 0x6636, 0x6, 0x0, 0xffffd889, 0x0, 0x98}) (async) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0x20, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_tracing={0x1a, 0x25, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@alu={0x4, 0x0, 0xa, 0xa, 0x3, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x47eb}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000880)='syzkaller\x00', 0x1000, 0x75, &(0x7f00000008c0)=""/117, 0x41100, 0x2, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x7f}, 0x8, 0x10, &(0x7f0000000980)={0x2, 0x4, 0x7, 0x1}, 0x10, 0x198a8, r4, 0x3, &(0x7f0000000a00)=[r3, r6, r3, r6, r9, r3, r3, r3, r3], &(0x7f0000000a40)=[{0x2, 0x3, 0x6, 0x6}, {0x3, 0x4, 0xc, 0x3}, {0x4, 0x1, 0xc, 0x7}], 0x10, 0x7}, 0x90) mkdirat$cgroup(r0, &(0x7f00000001c0)='syz0\x00', 0x1ff) 02:27:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='memory.numa_stat\x00', 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}], 0x8, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff}, 0xc) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0x4, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4}, 0x48) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x11, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='syzkaller\x00', 0x8, 0x97, &(0x7f0000000140)=""/151, 0x41000, 0x1, '\x00', r2, 0x2b, r3, 0x8, &(0x7f0000000540)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xb, 0x40, 0x2}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000800)=[0x1, r4, r5, r6, r7, r8], &(0x7f0000000840)=[{0x1, 0x5, 0x4}], 0x10, 0x4}, 0x90) 02:27:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='memory.numa_stat\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}], 0x8, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) (async) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff}, 0xc) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0x4, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4}, 0x48) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x11, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='syzkaller\x00', 0x8, 0x97, &(0x7f0000000140)=""/151, 0x41000, 0x1, '\x00', r2, 0x2b, r3, 0x8, &(0x7f0000000540)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xb, 0x40, 0x2}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000800)=[0x1, r4, r5, r6, r7, r8], &(0x7f0000000840)=[{0x1, 0x5, 0x4}], 0x10, 0x4}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x11, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='syzkaller\x00', 0x8, 0x97, &(0x7f0000000140)=""/151, 0x41000, 0x1, '\x00', r2, 0x2b, r3, 0x8, &(0x7f0000000540)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xb, 0x40, 0x2}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000800)=[0x1, r4, r5, r6, r7, r8], &(0x7f0000000840)=[{0x1, 0x5, 0x4}], 0x10, 0x4}, 0x90) 02:27:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='memory.numa_stat\x00', 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}], 0x8, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) (async) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff}, 0xc) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0x4, 0x10}, 0xc) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)}, 0x20) (async) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4}, 0x48) (async) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x11, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='syzkaller\x00', 0x8, 0x97, &(0x7f0000000140)=""/151, 0x41000, 0x1, '\x00', r2, 0x2b, r3, 0x8, &(0x7f0000000540)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xb, 0x40, 0x2}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000800)=[0x1, r4, r5, r6, r7, r8], &(0x7f0000000840)=[{0x1, 0x5, 0x4}], 0x10, 0x4}, 0x90) 02:27:57 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x108e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x88202, 0x4, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) openat$cgroup_pressure(r1, &(0x7f0000000100)='memory.pressure\x00', 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800400, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x53, 0x6, 0x5, 0x8}, {0x5, 0x40, 0x1f, 0xb6a8}]}) [ 812.860157][T21391] cgroup: fork rejected by pids controller in /syz2 02:27:57 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:57 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r3, r4, r3, r3, r3], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 813.669987][T20785] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 02:27:58 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x108e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x88202, 0x4, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) (async) r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x108e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x88202, 0x4, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) openat$cgroup_pressure(r1, &(0x7f0000000100)='memory.pressure\x00', 0x2, 0x0) (async) openat$cgroup_pressure(r1, &(0x7f0000000100)='memory.pressure\x00', 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800400, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x53, 0x6, 0x5, 0x8}, {0x5, 0x40, 0x1f, 0xb6a8}]}) 02:27:58 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x108e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x88202, 0x4, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) openat$cgroup_pressure(r1, &(0x7f0000000100)='memory.pressure\x00', 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800400, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x53, 0x6, 0x5, 0x8}, {0x5, 0x40, 0x1f, 0xb6a8}]}) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x108e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x88202, 0x4, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) (async) openat$cgroup_pressure(r1, &(0x7f0000000100)='memory.pressure\x00', 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) (async) openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfff) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800400, 0x0) (async) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x53, 0x6, 0x5, 0x8}, {0x5, 0x40, 0x1f, 0xb6a8}]}) (async) 02:27:58 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$sock(r0, &(0x7f0000000480)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x80000000}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000080)="4b6bb52003e94c", 0x7}, {&(0x7f00000000c0)="c28eb488d0c249d8369af4a4a9c552214e772cbe5e5af61ded1cb20c049d81ffb235ce8d90a472102461881facd791c4ee408af3ef425262c9b1b4051b1c8bd517b5d712f8de559764b3263c8d56580f683a469f2d60eaacb368b66d99447c8c6f81dab8cf182531c1e440a0c909b2d205", 0x71}, {&(0x7f0000000140)="917ac6cfd5f5f0e757dd5d00e23b6b9dcdeaae2abd2eb780cc660bbf37c1b119703ec77eba211f04112a3839a971c715a37c1ce13b90da656468ef0fca086bb584a5c499f4325ecc1eaee0c4cd3b7426a6127bd757", 0x55}, {&(0x7f00000001c0)="da94ac869edcdb756073a6792db708359645c4b4f1678bab0d12fb7624faa7bcced5251400e1f455bc3556405535476efb6e3de9cff79d", 0x37}, {&(0x7f0000000200)="dd93a4850c3eb482023753a7322f484b200bc97ce51ed93b1a6ad69770e204cdc925559f6de184b56cd4004b75058285076ffa5614c25ae4e94723a2435641953640772d09180d6bfee3a06a4d817341247f5fd175856e17f7d586a19b493e48de2f4fe968d2a30a3d793b9f42ac10dd9a472a2a20f387fa9ad6a863c2a87b022b289b7e084ed75abb24ed01ce105a9e143527e290a84bfa9bde4f09bf2774a659be50cfcf1346b92a5444f3f2", 0xad}, {&(0x7f00000002c0)="7b95fb303f3ae801f575f096b4cf1b0b93c10ad14c6977af460eefd5eae566053cdfb2ffd91f1d459aeed79a5ce9fe70d95a926d0cc961950da81f2ddc17b1c78e14569bf871912ede43beda4de38288f7167c617dead582a006b11b6f14ec1000087367990cb1870cb0db03e10821e6be005b78d047e1aa27b41ad14dbea9f4ffe43af893270c3a3002ac4eaa188b7b71f3e19d", 0x94}], 0x6, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x10001}}, @txtime={{0x18, 0x1, 0x3d, 0x1f}}, @txtime={{0x18, 0x1, 0x3d, 0x80000000}}], 0x48}, 0x80) 02:27:58 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$sock(r0, &(0x7f0000000480)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x80000000}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000080)="4b6bb52003e94c", 0x7}, {&(0x7f00000000c0)="c28eb488d0c249d8369af4a4a9c552214e772cbe5e5af61ded1cb20c049d81ffb235ce8d90a472102461881facd791c4ee408af3ef425262c9b1b4051b1c8bd517b5d712f8de559764b3263c8d56580f683a469f2d60eaacb368b66d99447c8c6f81dab8cf182531c1e440a0c909b2d205", 0x71}, {&(0x7f0000000140)="917ac6cfd5f5f0e757dd5d00e23b6b9dcdeaae2abd2eb780cc660bbf37c1b119703ec77eba211f04112a3839a971c715a37c1ce13b90da656468ef0fca086bb584a5c499f4325ecc1eaee0c4cd3b7426a6127bd757", 0x55}, {&(0x7f00000001c0)="da94ac869edcdb756073a6792db708359645c4b4f1678bab0d12fb7624faa7bcced5251400e1f455bc3556405535476efb6e3de9cff79d", 0x37}, {&(0x7f0000000200)="dd93a4850c3eb482023753a7322f484b200bc97ce51ed93b1a6ad69770e204cdc925559f6de184b56cd4004b75058285076ffa5614c25ae4e94723a2435641953640772d09180d6bfee3a06a4d817341247f5fd175856e17f7d586a19b493e48de2f4fe968d2a30a3d793b9f42ac10dd9a472a2a20f387fa9ad6a863c2a87b022b289b7e084ed75abb24ed01ce105a9e143527e290a84bfa9bde4f09bf2774a659be50cfcf1346b92a5444f3f2", 0xad}, {&(0x7f00000002c0)="7b95fb303f3ae801f575f096b4cf1b0b93c10ad14c6977af460eefd5eae566053cdfb2ffd91f1d459aeed79a5ce9fe70d95a926d0cc961950da81f2ddc17b1c78e14569bf871912ede43beda4de38288f7167c617dead582a006b11b6f14ec1000087367990cb1870cb0db03e10821e6be005b78d047e1aa27b41ad14dbea9f4ffe43af893270c3a3002ac4eaa188b7b71f3e19d", 0x94}], 0x6, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x10001}}, @txtime={{0x18, 0x1, 0x3d, 0x1f}}, @txtime={{0x18, 0x1, 0x3d, 0x80000000}}], 0x48}, 0x80) 02:27:59 executing program 1: perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$sock(r0, &(0x7f0000000480)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x80000000}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000080)="4b6bb52003e94c", 0x7}, {&(0x7f00000000c0)="c28eb488d0c249d8369af4a4a9c552214e772cbe5e5af61ded1cb20c049d81ffb235ce8d90a472102461881facd791c4ee408af3ef425262c9b1b4051b1c8bd517b5d712f8de559764b3263c8d56580f683a469f2d60eaacb368b66d99447c8c6f81dab8cf182531c1e440a0c909b2d205", 0x71}, {&(0x7f0000000140)="917ac6cfd5f5f0e757dd5d00e23b6b9dcdeaae2abd2eb780cc660bbf37c1b119703ec77eba211f04112a3839a971c715a37c1ce13b90da656468ef0fca086bb584a5c499f4325ecc1eaee0c4cd3b7426a6127bd757", 0x55}, {&(0x7f00000001c0)="da94ac869edcdb756073a6792db708359645c4b4f1678bab0d12fb7624faa7bcced5251400e1f455bc3556405535476efb6e3de9cff79d", 0x37}, {&(0x7f0000000200)="dd93a4850c3eb482023753a7322f484b200bc97ce51ed93b1a6ad69770e204cdc925559f6de184b56cd4004b75058285076ffa5614c25ae4e94723a2435641953640772d09180d6bfee3a06a4d817341247f5fd175856e17f7d586a19b493e48de2f4fe968d2a30a3d793b9f42ac10dd9a472a2a20f387fa9ad6a863c2a87b022b289b7e084ed75abb24ed01ce105a9e143527e290a84bfa9bde4f09bf2774a659be50cfcf1346b92a5444f3f2", 0xad}, {&(0x7f00000002c0)="7b95fb303f3ae801f575f096b4cf1b0b93c10ad14c6977af460eefd5eae566053cdfb2ffd91f1d459aeed79a5ce9fe70d95a926d0cc961950da81f2ddc17b1c78e14569bf871912ede43beda4de38288f7167c617dead582a006b11b6f14ec1000087367990cb1870cb0db03e10821e6be005b78d047e1aa27b41ad14dbea9f4ffe43af893270c3a3002ac4eaa188b7b71f3e19d", 0x94}], 0x6, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x10001}}, @txtime={{0x18, 0x1, 0x3d, 0x1f}}, @txtime={{0x18, 0x1, 0x3d, 0x80000000}}], 0x48}, 0x80) 02:27:59 executing program 1: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000040), 0x9) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:59 executing program 1: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000040), 0x9) (async, rerun: 64) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) 02:27:59 executing program 1: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000040), 0x9) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40080, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0xffff) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:27:59 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:27:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40080, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0xffff) (async, rerun: 64) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) 02:27:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40080, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0xffff) (async, rerun: 64) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) 02:27:59 executing program 1: r0 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001440)={0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000001640)={&(0x7f0000001480)=@hci={0x1f, 0x4, 0x2}, 0x80, &(0x7f0000001600)=[{&(0x7f00000015c0)="c62419651884bd518626", 0xa}, {&(0x7f0000002240)="ce2d245dc64ff74dc242d4914f85f003cf0812c96371293e58d5f4abff7a3a53a676ea80e78fdc85dded7f12c9aac9728f211a76c49a7a56fb5d10a11afaeae6cbbe8af0e6a7d9466566952bcb201cc034743add2171d86919467d8f303e12c895526283e75e3ed0e3c162446d2a9ec71b709766c0783921e0a9885d4b8ea4380eeafc838886987677b0b7bb9ac299d724755cf11c566ae7078a51b38f37da5af010868eb71f199c483cc5f3133dc4ce42a133f3216a7f5e3dc732d91fec859de33dbd5262eb84356dd5c12dffb66ce559d8e2fd6d1437417db41567ea6d7d4f4b4b6546f7488a09486c91c0c1079acd3a709b25646f2d8c24744d5e999be8e0e94d3012c4d1804001b406272a910c54b129e908ee6d88375538c8b6ccf67a2661df43ec43efc3257a7d275cc95d7ac672b474de373aec3938981a394c2f902e858f3c5f357a00fd3bcfa2ec3050644ed634a7f2af18218ae6b13b43612de3c6325856d3223c7865be8a9cb493203448e04825682e6640f229d03556616ba82a314d07097966021847e0b6069b2663f065783bf096042f74f9f4e49764eada6940d268f88327c71129dbcbeae4cd1de9f92a51c6d5d628f9c99772e50cddc048a7f41082ef3ddfb5070a0e2eae3f49f1b5c48550953c00fc5b635116fe2b934a6575a63508e42e34b1f15bc20a6e5005ececd57c6ba9495824198a6564ca435635b5245281822fabea10a7f6ab350234ddebbc947f64726adc061a21419835200c0f7fed6e6e6f26aab3dbb952b26299bbce43a8ff735df858763ec9bebfb3da2d6d3a228e4a0dca7278c9a8ffb4e56421905561789a9284bb8d55c98cbb76327cfa926d42a666e3ccba428ac95230b2cf4522b9454c7bd03ab3369c2ecd73dabfcac80df70beb1edfa9e2ff012bde384c4cc4cba3f3bcfd755882d001860c2faef0682197704b95da8f1fafb781ab0fdd7ab08a695c90e157a66afc29f696b33c5bae392514a60bba2cdbe00faaa4dbb83f5bd0fa285ec05f8f6859bc537758dbb1470dd62db377ac121fecd89802b7c0c167c38b72cb35be02a5ebf9e4c84116737a8c9c84469295ea0c9da2289986f868a945bd01e16c721ceac6e230d2e5729a3d1f800399e0409d3419d7ad7e8ef9ee0ced01a6b0eddabf1ac526d002ade521153bf18a7da565ea37ffd0598ded4bc9939f92bbd7323fbfd66344e794ceb151a21a32f8db9438c1b4805a9810275c650380dacadebb1c94700f8144799191123165a90871f54e620f00faa893e68f33a9ff47e44523b6fae32e2e925a64c788abfa46a3f1f8cc1844b32165d4e36355e2183ab9fb314715d381dc9a48de68334ed2c7e2c14f6bf45bfd1c5d3f76fb62c3dc9f6506d0dbf0833d4bb8d5d629c048d437fc41a5a1159603801f43dcd017a1de1206a1ad6b91a984d7b301428a29b9eaea5384f41089ed89b816cdc16b67395063c47e102907cf197a6371407b08ea99839cb6e877814a98062c2287aaf7ebd35c8000f44492b333456bf7e4049f2415d12fda61df3581243477d5ee9aba9e80e53ae3a1bfef509bca14afc2a36f1b1521c267c142e6b68198471c72b96ee6227ea563b79b53e3f6198fb91c37dc5272ef4af1886ef74ec3c1e3dd3560d5bb31d90601ca6c8c2bcebfad83c054c956374a55aeb79c80a2e2e213f67bf41de92495d928ad8622e1d06e979851ddf6c324bfa09cc7ec89a09dd30d4d17238aec941e42b3fc02a29089cb9038ff41c36fbbe78b84e67abeef846829f02122ee8cecc8f4f9b6fd23e697898d4ff2cc3938394f5d9b7c3d8b40610582c2debd3bb323467b34db9b7b8516804fc90a1c19a15e640ad0383c05e8dfc41f3e2980d6d9e4c1e15d1678dfda06eb7d84fd38f205c1000ff7ac06637e8ccb4722b8a56c63b0889d64996484207b09fcb9ec6215473a052bcc798ccc8df2c4649aa82a4cb5d816022edadd2cad99b26b2d8e0cf78d66251785a455cf6dbaa4981eb20b44ca5318a037cb4789bd7593c490c2567511acbc57ac67b4a38cfc274d9ace8ae868e9f32187ed7772e4e7ca77e2a8cd97371c1c706d606e3ba33b697fbff5b6e1769eef9e5cb85c5d9821e14d9edf2a55ef959d9038015e12a28a325e76c733eac3b6a02daf3ae05dec1e17c38db8aacee8d290baecc6cf41d607fd5e70b348af5173f24a8fe392100c1dfc4e602a120c0d7a0508caa0d0f679a274c0c5c56ce0f640c46bdbac29bf42339899f668eac9aa10e00286fe2b0fe25b262f595414d9d117c8a2bc633db0e8553fcd8aade15f564e030c927523510ed992d6be24549b65aafe833bf6815be5075635a515b014e53875cdeba65b28c5b3c5d4f3d786f8cae9e6260cc9360903b2259c7c235230599c83f3011601c9adf2ed69b32b7df4f5f6e79ff86b56043f5710d70f3d3ea5fd89ab5be3c9d42df47d2ee7e99b16b3b9b6c1802809b45131bdcb229cf6d2095366e8e026cbb0aa215a04be82feb5e687c99c9e5aa48e8ae16138b51fcb9089220d0b4fe44bbb8340cf310d3e82d594f27dabb86773e8b012459e96af4ea90bd310148e127c6c32ade02a496584b5fea02bbdb905cd4260804432acbf0788db9cdecb4952556a1944ab5d89bb195676b57305dab9842212a66ce87522268d4d132175641ff9ee7e11edd801ac47e895839dc938e82df0a9688e295ce1db3ef5facab4cebc78fb693aa927945f25eb8af9a71ad2e36385362eb13049d22bca8cb9cbf8ded2132db595cff948542290b6e0e139e78d669b2244b6eea6551540c42ffb21b4198437e3f703bbaa7f3a8af47e148cd935c1f681c6a7e85b76f693a31adfce47257dd9210cd555ead5a83a9c5d6c0620ac6e546e20b41f9581d874c692432048050e481a8609afd284a9b3f872162f923c5bbe9f6b0b4714b60b190db00fed1919d6ae8cec7bc45e8b662f20aac3af71476ed905548e2dc92990d9a4943dbcf5ba64dfe4ebb2a3a973f2f14c913c0b7a8333b356375b6eeb4165e73e48452ef2a188c6f819a4ca59286ad5dfc0056b0447b10afb9b0d3b392cbe54f60f88a694d8b824694bdc4eef214dbc3435bf368f7be5383e9dd3431dfd49ee969bdaaaa1d10f72689255e0899ee7059ba3816db54110c3150ad49d83f63582e604e4eecb5cb1b8a9fcd78dadcaaab1a56e2e7e5daa9ae01deb4d3960c0304f702df3e1778091e9bb348c7cdb33fcee5d8d0105da115b86dcd43271d20e27d89438e0600836ad3802600d1ed2c0fecd6abc7ae319b45c13877296e0be10c34fb1821d71135c1189b31c99f230afccbfd3c372901522cd28df49b89e61545e6f838692a4d53cf719fa5f584dafc7de76606e30dc169948eec1462368c374047c14599c8bf0c53fb7f3266969ad6e17f9d9bcf4fe95658939d83eb83a79a8d276a9f0d5947d80b3e4b8dbc657a1bde1bdf522cd42ab611b19a5ad7e890ef6aa285813000889e4e5fe7deafa5cfe3654bfa40aa0b46325f32119d47aca02b02b3419bc19e58caf308fd503e3d649cbdfca0584ce1cd6f84c5a203825336e88099fac7023fd3ad6a6031bc712e29885acbb481747c6c5da05c8176c64d54f07fd88a82985dfd8ed3f101caccd7ac5f59edeb87672c8ee6fd2cf7db84fb374e800c2fd65de2efc9eec400b8b2d4160f99ab8cdc50ef7a7d45292505a04f468274270d9b391bab593fbef34b59fa273098ffacdef8db25044906639af7eeecf883ca409a48e79e225e16374caf5f6ed6d27fdee2a892fc84c84de22ff6d7d1fb88725aae9a90e176b131625540316c6e0d7f2206d9f46dbec5ab83947098f803297865233dec2fc1041ff04585127fc00e8f6b9951e7b8cbc983c36d859e69d641d9308ea389255ececec3bbd9ed4f36d860af51e281d2d3eb92c2be33f1c030820d5da8e2b62f58e1db6a6fc871455bb443ed46ba6b2781f0ee4a0ee0a2fdfe274435622c1e897d44d6d5a6c4dee73360d992c2a963b21e9b1551bf0495171fb7785e39c643d249f277bcb5446fc7e1e99a6312be33bd9967e0a2c58c48e0291480be5c1a6857739bd0dc6dcd7e0286516a0fddbb86ccc1119d8c3662771b19be12433ad5096e9fd7c93c646cd51afce56a6618387a82e3f3969d50babb406b1bcd87f0c9c9c8bd9d537fabbf19e2deb775be81c79bf30e494f25fddf2646b244f5a79b2117482d30555189294b9575fa9f8f58210f45c45fe024628c0149b017cfc5056210e41cb748c629f420654b55ef74ffce8cdf7df25c42af3f8187cc5e32ffacab2a69ee0237107f13ae1dae5c615f7a7d0d7c311a7c2642485950affe39d51d5742f975d1e8ccf9b4a096634a1184df7d7250e8af66642d537509e9f6b2656451023ea52788658ffc6921d50c57c0ab1b93a3671fa47b3f188b58587bd451754281d127f999ad13e3b5d13ae4d91232d876b607d01d5792bb227e825eebec983bb91590b22358491e1ed674f79999aa6753e05bbcdf94b16fa4239b091530b3fb184461a7f44f4034c0cada1698a9d8e044370dd6c2692ffb059c56f5c510e7ad72f522cd3c8a8fe80666dfa1f1c4a066561b913393f04978064419303b29c84fcf21a3ea873cc3c1eae81c3fe6b27d985ea5bc5aa968bcf1d61bedcda08e1f80aff390af54a192d09bef854b7049c99108e93f9995cb81180bb13716b1848d56acde70511ac1ab54b8295f2f69d33705101ec2f9955652882e86d84c7a90285892d11fa773124e0a92bbd24aa60447f633d62a47ea36a981bca9b3d259f0a3514afc95328a0443a05dd70cac692b1bd07a03d21643a89db6e1b3f88f1a3b3e5161f40adeb5b42c719265df5bf1ae860bedc7a0b603d26cde252e8ded55c36ffe39add2c37994e92127860d356c27eee7b8a1bc524ab9db8914f9df6ac4f4c44147c7d2eeb320369e0d8bfdb10592cc6e6a3406b05972fcf7031014e1e53ca9a9c4f5e36a6ff85d2e92f3298396435242c2a3153a77e7e77f025603e9c7e78c37610c330fca5527d6e4a4d3637c3255ab73be4cdfd55280c9175e248af30b7ae0e9361984eb2ee4dcad71bbd69619b59cac612e50757d4dbcae78412ef47f3547f92cd60bcfcf5a72ed69ecc7b16a6eb53810d37bfa1241cf926f0a154a42bf726021d85168694a579f5af61531d47db0dd8c071168cc5c9d010dc5467176726ed9ffe5cad33d5d4e4d44fe0a13f9a8b0a24a936142d317a17b8c6c91b1560f983a92ff392b93ded6000a3ad5bdf0eef3a190cd773eb8ad64798001d196e17a70c8d0ab460f6ead815a4feea87d07dd3b074fa7e04645db590c8fead9ad9dde75840ae62a1892810bcd7817be8b9f940d9a10b2c30f2167f1422dfc3eb44a4e7a87345b1979b81cb839ec6cac93a0d7c07e7ee30578ea402d733baa988453dfc890967b896a653a872ff6f0264f9371c0fc8a69ad8524a6fb20c6a1e6f06e5974be405bb58d393f38a4caa827d1621783eda5878f747cc1208edb378d55d0fb0ea8d8c0381d8cf2edaf17aa8a5f13e3b85b9fbb7e2cf9814608d671b7a9cf3b1a8f4ddd11e3042114c6503d3f29b88b928dacf98b1125c57bc5259168aa4c424b81c1f2168380edaa5d4dc70296095c336e64dad96fc5158b7fc3dc84d6615229e036d3578b82690b3b862c6afcb2b1e484aae6eefe9d159f3552df08e3bb593f2f122e5da472c77dceebdbdc882399bc4d24c0fa0c8570b63a4b656d81eb8dcdbb7ce42c57e8428f874f636866a331f72c4386a5c3454121a2195731a", 0x1000}], 0x2}, 0x20000005) r2 = gettid() r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001680)=@o_path={&(0x7f0000001400)='./file0\x00', 0x0, 0x0, r1}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0x58, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001780)=@bloom_filter={0x1e, 0x10000, 0x4, 0x2, 0x0, r3, 0xf6, '\x00', r4, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0x2}, 0x48) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001380)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="21e93fd32babbff39314122fb79fee84947b8a3d1b3662c7f1ee28eeb6e4727609379dc5e9d48e4a9b88cb823601073dc916eb3045f6c9b6fc49ff50548d028f4260d7c2bca81194bf26c673076c9aabb35e5460a22194999eadd5437b14b8d20f713bb587e71bfb4fe232ab07be675bbfbcbb6d47d1e7b3b7f0555bd7c92db85559f101ec4206c775f6d4196214ab888383aec0126750fd27e6311933156455d1f1e68e6090299130a892428b076608276c5e092badf8900a993c68a7", 0xbd}, {&(0x7f0000001180)="464b1f1c5642f6e574df0ad7848f96a481313efe00e39b9b922f33592883cef62664a2f483c11c35d143c939a7edd2fa4681ee5b6432552c6bbaaac42a5e0f552a39b6e0e337c19c50fad7f660dadc77b0bb5c8080db8d76610b2d4fee", 0x5d}, {&(0x7f0000001200)="0ad4a5611e396bb3e1c4fbef64c933f4dde8381a499135457ad8b9a00c5ea1a681d8e52452499e3aa9423664b040d2cd13893207fb39262554b6ad741095b0432c2867af717deaa10d7bad0bf6725d8795b3c6cabc8912ad964073701ca4d02e2ed5475fa89f3abaf0a5e28ab043c349a61ff7b1dae035f6370a85fd98ecbeb451293d056b73df900492d018b17ee4a140f3559c623891c51d6cc8ab4697dcd54e035f70ed8de140e88a37d50c88eaed2d08f4ea486eaa22f56921c406e5cb786db423417d49d4", 0xc7}, {&(0x7f0000001300)="38017cf1c150f3861795ccea2428999a5277b5c52b9f1710d1c17b17a209477be169e02cd0d992e377d9da375ec4ff6437d7e50f352adfc17d795096151d680d237933", 0x43}], 0x5, &(0x7f0000001540)=ANY=[@ANYBLOB="1c001b0000000000010000010000006c9f96ea9c05661b196da37bb3b65b1dc07e5deb32a84d9e080000", @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x60}, 0x44054) r5 = perf_event_open$cgroup(&(0x7f00000021c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r5) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)=0x2) 02:27:59 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, 0x0, &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:00 executing program 1: r0 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001440)={0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000001640)={&(0x7f0000001480)=@hci={0x1f, 0x4, 0x2}, 0x80, &(0x7f0000001600)=[{&(0x7f00000015c0)="c62419651884bd518626", 0xa}, {&(0x7f0000002240)="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", 0x1000}], 0x2}, 0x20000005) gettid() (async) r2 = gettid() r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001680)=@o_path={&(0x7f0000001400)='./file0\x00', 0x0, 0x0, r1}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0x58, &(0x7f00000016c0)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0x58, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001780)=@bloom_filter={0x1e, 0x10000, 0x4, 0x2, 0x0, r3, 0xf6, '\x00', r4, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0x2}, 0x48) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001380)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="21e93fd32babbff39314122fb79fee84947b8a3d1b3662c7f1ee28eeb6e4727609379dc5e9d48e4a9b88cb823601073dc916eb3045f6c9b6fc49ff50548d028f4260d7c2bca81194bf26c673076c9aabb35e5460a22194999eadd5437b14b8d20f713bb587e71bfb4fe232ab07be675bbfbcbb6d47d1e7b3b7f0555bd7c92db85559f101ec4206c775f6d4196214ab888383aec0126750fd27e6311933156455d1f1e68e6090299130a892428b076608276c5e092badf8900a993c68a7", 0xbd}, {&(0x7f0000001180)="464b1f1c5642f6e574df0ad7848f96a481313efe00e39b9b922f33592883cef62664a2f483c11c35d143c939a7edd2fa4681ee5b6432552c6bbaaac42a5e0f552a39b6e0e337c19c50fad7f660dadc77b0bb5c8080db8d76610b2d4fee", 0x5d}, {&(0x7f0000001200)="0ad4a5611e396bb3e1c4fbef64c933f4dde8381a499135457ad8b9a00c5ea1a681d8e52452499e3aa9423664b040d2cd13893207fb39262554b6ad741095b0432c2867af717deaa10d7bad0bf6725d8795b3c6cabc8912ad964073701ca4d02e2ed5475fa89f3abaf0a5e28ab043c349a61ff7b1dae035f6370a85fd98ecbeb451293d056b73df900492d018b17ee4a140f3559c623891c51d6cc8ab4697dcd54e035f70ed8de140e88a37d50c88eaed2d08f4ea486eaa22f56921c406e5cb786db423417d49d4", 0xc7}, {&(0x7f0000001300)="38017cf1c150f3861795ccea2428999a5277b5c52b9f1710d1c17b17a209477be169e02cd0d992e377d9da375ec4ff6437d7e50f352adfc17d795096151d680d237933", 0x43}], 0x5, &(0x7f0000001540)=ANY=[@ANYBLOB="1c001b0000000000010000010000006c9f96ea9c05661b196da37bb3b65b1dc07e5deb32a84d9e080000", @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x60}, 0x44054) perf_event_open$cgroup(&(0x7f00000021c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) (async) r5 = perf_event_open$cgroup(&(0x7f00000021c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r5) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)=0x2) 02:28:00 executing program 1: r0 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001440)={0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000001640)={&(0x7f0000001480)=@hci={0x1f, 0x4, 0x2}, 0x80, &(0x7f0000001600)=[{&(0x7f00000015c0)="c62419651884bd518626", 0xa}, {&(0x7f0000002240)="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", 0x1000}], 0x2}, 0x20000005) r2 = gettid() r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001680)=@o_path={&(0x7f0000001400)='./file0\x00', 0x0, 0x0, r1}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0x58, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001780)=@bloom_filter={0x1e, 0x10000, 0x4, 0x2, 0x0, r3, 0xf6, '\x00', r4, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0x2}, 0x48) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001380)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="21e93fd32babbff39314122fb79fee84947b8a3d1b3662c7f1ee28eeb6e4727609379dc5e9d48e4a9b88cb823601073dc916eb3045f6c9b6fc49ff50548d028f4260d7c2bca81194bf26c673076c9aabb35e5460a22194999eadd5437b14b8d20f713bb587e71bfb4fe232ab07be675bbfbcbb6d47d1e7b3b7f0555bd7c92db85559f101ec4206c775f6d4196214ab888383aec0126750fd27e6311933156455d1f1e68e6090299130a892428b076608276c5e092badf8900a993c68a7", 0xbd}, {&(0x7f0000001180)="464b1f1c5642f6e574df0ad7848f96a481313efe00e39b9b922f33592883cef62664a2f483c11c35d143c939a7edd2fa4681ee5b6432552c6bbaaac42a5e0f552a39b6e0e337c19c50fad7f660dadc77b0bb5c8080db8d76610b2d4fee", 0x5d}, {&(0x7f0000001200)="0ad4a5611e396bb3e1c4fbef64c933f4dde8381a499135457ad8b9a00c5ea1a681d8e52452499e3aa9423664b040d2cd13893207fb39262554b6ad741095b0432c2867af717deaa10d7bad0bf6725d8795b3c6cabc8912ad964073701ca4d02e2ed5475fa89f3abaf0a5e28ab043c349a61ff7b1dae035f6370a85fd98ecbeb451293d056b73df900492d018b17ee4a140f3559c623891c51d6cc8ab4697dcd54e035f70ed8de140e88a37d50c88eaed2d08f4ea486eaa22f56921c406e5cb786db423417d49d4", 0xc7}, {&(0x7f0000001300)="38017cf1c150f3861795ccea2428999a5277b5c52b9f1710d1c17b17a209477be169e02cd0d992e377d9da375ec4ff6437d7e50f352adfc17d795096151d680d237933", 0x43}], 0x5, &(0x7f0000001540)=ANY=[@ANYBLOB="1c001b0000000000010000010000006c9f96ea9c05661b196da37bb3b65b1dc07e5deb32a84d9e080000", @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x60}, 0x44054) r5 = perf_event_open$cgroup(&(0x7f00000021c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r5) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)=0x2) gettid() (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001440)) (async) sendmsg$sock(r1, &(0x7f0000001640)={&(0x7f0000001480)=@hci={0x1f, 0x4, 0x2}, 0x80, &(0x7f0000001600)=[{&(0x7f00000015c0)="c62419651884bd518626", 0xa}, {&(0x7f0000002240)="ce2d245dc64ff74dc242d4914f85f003cf0812c96371293e58d5f4abff7a3a53a676ea80e78fdc85dded7f12c9aac9728f211a76c49a7a56fb5d10a11afaeae6cbbe8af0e6a7d9466566952bcb201cc034743add2171d86919467d8f303e12c895526283e75e3ed0e3c162446d2a9ec71b709766c0783921e0a9885d4b8ea4380eeafc838886987677b0b7bb9ac299d724755cf11c566ae7078a51b38f37da5af010868eb71f199c483cc5f3133dc4ce42a133f3216a7f5e3dc732d91fec859de33dbd5262eb84356dd5c12dffb66ce559d8e2fd6d1437417db41567ea6d7d4f4b4b6546f7488a09486c91c0c1079acd3a709b25646f2d8c24744d5e999be8e0e94d3012c4d1804001b406272a910c54b129e908ee6d88375538c8b6ccf67a2661df43ec43efc3257a7d275cc95d7ac672b474de373aec3938981a394c2f902e858f3c5f357a00fd3bcfa2ec3050644ed634a7f2af18218ae6b13b43612de3c6325856d3223c7865be8a9cb493203448e04825682e6640f229d03556616ba82a314d07097966021847e0b6069b2663f065783bf096042f74f9f4e49764eada6940d268f88327c71129dbcbeae4cd1de9f92a51c6d5d628f9c99772e50cddc048a7f41082ef3ddfb5070a0e2eae3f49f1b5c48550953c00fc5b635116fe2b934a6575a63508e42e34b1f15bc20a6e5005ececd57c6ba9495824198a6564ca435635b5245281822fabea10a7f6ab350234ddebbc947f64726adc061a21419835200c0f7fed6e6e6f26aab3dbb952b26299bbce43a8ff735df858763ec9bebfb3da2d6d3a228e4a0dca7278c9a8ffb4e56421905561789a9284bb8d55c98cbb76327cfa926d42a666e3ccba428ac95230b2cf4522b9454c7bd03ab3369c2ecd73dabfcac80df70beb1edfa9e2ff012bde384c4cc4cba3f3bcfd755882d001860c2faef0682197704b95da8f1fafb781ab0fdd7ab08a695c90e157a66afc29f696b33c5bae392514a60bba2cdbe00faaa4dbb83f5bd0fa285ec05f8f6859bc537758dbb1470dd62db377ac121fecd89802b7c0c167c38b72cb35be02a5ebf9e4c84116737a8c9c84469295ea0c9da2289986f868a945bd01e16c721ceac6e230d2e5729a3d1f800399e0409d3419d7ad7e8ef9ee0ced01a6b0eddabf1ac526d002ade521153bf18a7da565ea37ffd0598ded4bc9939f92bbd7323fbfd66344e794ceb151a21a32f8db9438c1b4805a9810275c650380dacadebb1c94700f8144799191123165a90871f54e620f00faa893e68f33a9ff47e44523b6fae32e2e925a64c788abfa46a3f1f8cc1844b32165d4e36355e2183ab9fb314715d381dc9a48de68334ed2c7e2c14f6bf45bfd1c5d3f76fb62c3dc9f6506d0dbf0833d4bb8d5d629c048d437fc41a5a1159603801f43dcd017a1de1206a1ad6b91a984d7b301428a29b9eaea5384f41089ed89b816cdc16b67395063c47e102907cf197a6371407b08ea99839cb6e877814a98062c2287aaf7ebd35c8000f44492b333456bf7e4049f2415d12fda61df3581243477d5ee9aba9e80e53ae3a1bfef509bca14afc2a36f1b1521c267c142e6b68198471c72b96ee6227ea563b79b53e3f6198fb91c37dc5272ef4af1886ef74ec3c1e3dd3560d5bb31d90601ca6c8c2bcebfad83c054c956374a55aeb79c80a2e2e213f67bf41de92495d928ad8622e1d06e979851ddf6c324bfa09cc7ec89a09dd30d4d17238aec941e42b3fc02a29089cb9038ff41c36fbbe78b84e67abeef846829f02122ee8cecc8f4f9b6fd23e697898d4ff2cc3938394f5d9b7c3d8b40610582c2debd3bb323467b34db9b7b8516804fc90a1c19a15e640ad0383c05e8dfc41f3e2980d6d9e4c1e15d1678dfda06eb7d84fd38f205c1000ff7ac06637e8ccb4722b8a56c63b0889d64996484207b09fcb9ec6215473a052bcc798ccc8df2c4649aa82a4cb5d816022edadd2cad99b26b2d8e0cf78d66251785a455cf6dbaa4981eb20b44ca5318a037cb4789bd7593c490c2567511acbc57ac67b4a38cfc274d9ace8ae868e9f32187ed7772e4e7ca77e2a8cd97371c1c706d606e3ba33b697fbff5b6e1769eef9e5cb85c5d9821e14d9edf2a55ef959d9038015e12a28a325e76c733eac3b6a02daf3ae05dec1e17c38db8aacee8d290baecc6cf41d607fd5e70b348af5173f24a8fe392100c1dfc4e602a120c0d7a0508caa0d0f679a274c0c5c56ce0f640c46bdbac29bf42339899f668eac9aa10e00286fe2b0fe25b262f595414d9d117c8a2bc633db0e8553fcd8aade15f564e030c927523510ed992d6be24549b65aafe833bf6815be5075635a515b014e53875cdeba65b28c5b3c5d4f3d786f8cae9e6260cc9360903b2259c7c235230599c83f3011601c9adf2ed69b32b7df4f5f6e79ff86b56043f5710d70f3d3ea5fd89ab5be3c9d42df47d2ee7e99b16b3b9b6c1802809b45131bdcb229cf6d2095366e8e026cbb0aa215a04be82feb5e687c99c9e5aa48e8ae16138b51fcb9089220d0b4fe44bbb8340cf310d3e82d594f27dabb86773e8b012459e96af4ea90bd310148e127c6c32ade02a496584b5fea02bbdb905cd4260804432acbf0788db9cdecb4952556a1944ab5d89bb195676b57305dab9842212a66ce87522268d4d132175641ff9ee7e11edd801ac47e895839dc938e82df0a9688e295ce1db3ef5facab4cebc78fb693aa927945f25eb8af9a71ad2e36385362eb13049d22bca8cb9cbf8ded2132db595cff948542290b6e0e139e78d669b2244b6eea6551540c42ffb21b4198437e3f703bbaa7f3a8af47e148cd935c1f681c6a7e85b76f693a31adfce47257dd9210cd555ead5a83a9c5d6c0620ac6e546e20b41f9581d874c692432048050e481a8609afd284a9b3f872162f923c5bbe9f6b0b4714b60b190db00fed1919d6ae8cec7bc45e8b662f20aac3af71476ed905548e2dc92990d9a4943dbcf5ba64dfe4ebb2a3a973f2f14c913c0b7a8333b356375b6eeb4165e73e48452ef2a188c6f819a4ca59286ad5dfc0056b0447b10afb9b0d3b392cbe54f60f88a694d8b824694bdc4eef214dbc3435bf368f7be5383e9dd3431dfd49ee969bdaaaa1d10f72689255e0899ee7059ba3816db54110c3150ad49d83f63582e604e4eecb5cb1b8a9fcd78dadcaaab1a56e2e7e5daa9ae01deb4d3960c0304f702df3e1778091e9bb348c7cdb33fcee5d8d0105da115b86dcd43271d20e27d89438e0600836ad3802600d1ed2c0fecd6abc7ae319b45c13877296e0be10c34fb1821d71135c1189b31c99f230afccbfd3c372901522cd28df49b89e61545e6f838692a4d53cf719fa5f584dafc7de76606e30dc169948eec1462368c374047c14599c8bf0c53fb7f3266969ad6e17f9d9bcf4fe95658939d83eb83a79a8d276a9f0d5947d80b3e4b8dbc657a1bde1bdf522cd42ab611b19a5ad7e890ef6aa285813000889e4e5fe7deafa5cfe3654bfa40aa0b46325f32119d47aca02b02b3419bc19e58caf308fd503e3d649cbdfca0584ce1cd6f84c5a203825336e88099fac7023fd3ad6a6031bc712e29885acbb481747c6c5da05c8176c64d54f07fd88a82985dfd8ed3f101caccd7ac5f59edeb87672c8ee6fd2cf7db84fb374e800c2fd65de2efc9eec400b8b2d4160f99ab8cdc50ef7a7d45292505a04f468274270d9b391bab593fbef34b59fa273098ffacdef8db25044906639af7eeecf883ca409a48e79e225e16374caf5f6ed6d27fdee2a892fc84c84de22ff6d7d1fb88725aae9a90e176b131625540316c6e0d7f2206d9f46dbec5ab83947098f803297865233dec2fc1041ff04585127fc00e8f6b9951e7b8cbc983c36d859e69d641d9308ea389255ececec3bbd9ed4f36d860af51e281d2d3eb92c2be33f1c030820d5da8e2b62f58e1db6a6fc871455bb443ed46ba6b2781f0ee4a0ee0a2fdfe274435622c1e897d44d6d5a6c4dee73360d992c2a963b21e9b1551bf0495171fb7785e39c643d249f277bcb5446fc7e1e99a6312be33bd9967e0a2c58c48e0291480be5c1a6857739bd0dc6dcd7e0286516a0fddbb86ccc1119d8c3662771b19be12433ad5096e9fd7c93c646cd51afce56a6618387a82e3f3969d50babb406b1bcd87f0c9c9c8bd9d537fabbf19e2deb775be81c79bf30e494f25fddf2646b244f5a79b2117482d30555189294b9575fa9f8f58210f45c45fe024628c0149b017cfc5056210e41cb748c629f420654b55ef74ffce8cdf7df25c42af3f8187cc5e32ffacab2a69ee0237107f13ae1dae5c615f7a7d0d7c311a7c2642485950affe39d51d5742f975d1e8ccf9b4a096634a1184df7d7250e8af66642d537509e9f6b2656451023ea52788658ffc6921d50c57c0ab1b93a3671fa47b3f188b58587bd451754281d127f999ad13e3b5d13ae4d91232d876b607d01d5792bb227e825eebec983bb91590b22358491e1ed674f79999aa6753e05bbcdf94b16fa4239b091530b3fb184461a7f44f4034c0cada1698a9d8e044370dd6c2692ffb059c56f5c510e7ad72f522cd3c8a8fe80666dfa1f1c4a066561b913393f04978064419303b29c84fcf21a3ea873cc3c1eae81c3fe6b27d985ea5bc5aa968bcf1d61bedcda08e1f80aff390af54a192d09bef854b7049c99108e93f9995cb81180bb13716b1848d56acde70511ac1ab54b8295f2f69d33705101ec2f9955652882e86d84c7a90285892d11fa773124e0a92bbd24aa60447f633d62a47ea36a981bca9b3d259f0a3514afc95328a0443a05dd70cac692b1bd07a03d21643a89db6e1b3f88f1a3b3e5161f40adeb5b42c719265df5bf1ae860bedc7a0b603d26cde252e8ded55c36ffe39add2c37994e92127860d356c27eee7b8a1bc524ab9db8914f9df6ac4f4c44147c7d2eeb320369e0d8bfdb10592cc6e6a3406b05972fcf7031014e1e53ca9a9c4f5e36a6ff85d2e92f3298396435242c2a3153a77e7e77f025603e9c7e78c37610c330fca5527d6e4a4d3637c3255ab73be4cdfd55280c9175e248af30b7ae0e9361984eb2ee4dcad71bbd69619b59cac612e50757d4dbcae78412ef47f3547f92cd60bcfcf5a72ed69ecc7b16a6eb53810d37bfa1241cf926f0a154a42bf726021d85168694a579f5af61531d47db0dd8c071168cc5c9d010dc5467176726ed9ffe5cad33d5d4e4d44fe0a13f9a8b0a24a936142d317a17b8c6c91b1560f983a92ff392b93ded6000a3ad5bdf0eef3a190cd773eb8ad64798001d196e17a70c8d0ab460f6ead815a4feea87d07dd3b074fa7e04645db590c8fead9ad9dde75840ae62a1892810bcd7817be8b9f940d9a10b2c30f2167f1422dfc3eb44a4e7a87345b1979b81cb839ec6cac93a0d7c07e7ee30578ea402d733baa988453dfc890967b896a653a872ff6f0264f9371c0fc8a69ad8524a6fb20c6a1e6f06e5974be405bb58d393f38a4caa827d1621783eda5878f747cc1208edb378d55d0fb0ea8d8c0381d8cf2edaf17aa8a5f13e3b85b9fbb7e2cf9814608d671b7a9cf3b1a8f4ddd11e3042114c6503d3f29b88b928dacf98b1125c57bc5259168aa4c424b81c1f2168380edaa5d4dc70296095c336e64dad96fc5158b7fc3dc84d6615229e036d3578b82690b3b862c6afcb2b1e484aae6eefe9d159f3552df08e3bb593f2f122e5da472c77dceebdbdc882399bc4d24c0fa0c8570b63a4b656d81eb8dcdbb7ce42c57e8428f874f636866a331f72c4386a5c3454121a2195731a", 0x1000}], 0x2}, 0x20000005) (async) gettid() (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001680)=@o_path={&(0x7f0000001400)='./file0\x00', 0x0, 0x0, r1}, 0x18) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0x58, &(0x7f00000016c0)}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001780)=@bloom_filter={0x1e, 0x10000, 0x4, 0x2, 0x0, r3, 0xf6, '\x00', r4, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0x2}, 0x48) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001380)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="21e93fd32babbff39314122fb79fee84947b8a3d1b3662c7f1ee28eeb6e4727609379dc5e9d48e4a9b88cb823601073dc916eb3045f6c9b6fc49ff50548d028f4260d7c2bca81194bf26c673076c9aabb35e5460a22194999eadd5437b14b8d20f713bb587e71bfb4fe232ab07be675bbfbcbb6d47d1e7b3b7f0555bd7c92db85559f101ec4206c775f6d4196214ab888383aec0126750fd27e6311933156455d1f1e68e6090299130a892428b076608276c5e092badf8900a993c68a7", 0xbd}, {&(0x7f0000001180)="464b1f1c5642f6e574df0ad7848f96a481313efe00e39b9b922f33592883cef62664a2f483c11c35d143c939a7edd2fa4681ee5b6432552c6bbaaac42a5e0f552a39b6e0e337c19c50fad7f660dadc77b0bb5c8080db8d76610b2d4fee", 0x5d}, {&(0x7f0000001200)="0ad4a5611e396bb3e1c4fbef64c933f4dde8381a499135457ad8b9a00c5ea1a681d8e52452499e3aa9423664b040d2cd13893207fb39262554b6ad741095b0432c2867af717deaa10d7bad0bf6725d8795b3c6cabc8912ad964073701ca4d02e2ed5475fa89f3abaf0a5e28ab043c349a61ff7b1dae035f6370a85fd98ecbeb451293d056b73df900492d018b17ee4a140f3559c623891c51d6cc8ab4697dcd54e035f70ed8de140e88a37d50c88eaed2d08f4ea486eaa22f56921c406e5cb786db423417d49d4", 0xc7}, {&(0x7f0000001300)="38017cf1c150f3861795ccea2428999a5277b5c52b9f1710d1c17b17a209477be169e02cd0d992e377d9da375ec4ff6437d7e50f352adfc17d795096151d680d237933", 0x43}], 0x5, &(0x7f0000001540)=ANY=[@ANYBLOB="1c001b0000000000010000010000006c9f96ea9c05661b196da37bb3b65b1dc07e5deb32a84d9e080000", @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x60}, 0x44054) (async) perf_event_open$cgroup(&(0x7f00000021c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r5) (async) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)=0x2) (async) 02:28:00 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:01 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:01 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:02 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:03 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:03 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:04 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, 0x0, &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:04 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 820.742695][ T3306] Bluetooth: hci4: command 0x0406 tx timeout 02:28:05 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:06 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:07 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 822.791107][T20785] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 02:28:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:07 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, 0x0, &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:07 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={0x0, 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 823.340661][T20785] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 823.816655][T20785] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 02:28:08 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 824.618773][T20785] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 825.482432][T20785] netdevsim netdevsim3 netdevsim1: renamed from eth1 02:28:09 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 826.214821][T20785] netdevsim netdevsim3 netdevsim2: renamed from eth2 02:28:10 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:10 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={0x0, 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 826.335214][T20785] netdevsim netdevsim3 netdevsim3: renamed from eth3 02:28:11 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:11 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 827.008123][T20785] 8021q: adding VLAN 0 to HW filter on device bond0 [ 827.095504][T17839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 827.113558][T17839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 827.146861][T20785] 8021q: adding VLAN 0 to HW filter on device team0 [ 827.185926][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 827.199479][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 827.222804][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 827.229898][ T3306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 827.264186][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 827.272391][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 827.295369][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 827.310023][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 827.317144][ T3306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 827.326903][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 827.413036][T17839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 827.422106][T17839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 827.487442][T17839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 827.527766][T17839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 827.538538][T17839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 827.570622][T20785] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 827.632588][T20785] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 827.684108][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 827.692272][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 827.724651][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 827.742988][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 827.751528][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 827.809629][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 02:28:12 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 828.243557][T20785] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 828.284559][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 828.292093][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 828.333533][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 828.342264][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 828.404077][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 828.412443][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 828.448029][T20785] device veth0_vlan entered promiscuous mode [ 828.466635][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 828.478552][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 828.510626][T20785] device veth1_vlan entered promiscuous mode [ 828.576010][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 828.600315][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 828.623451][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 828.632129][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 828.673253][T20785] device veth0_macvtap entered promiscuous mode [ 828.683168][T20785] device veth1_macvtap entered promiscuous mode [ 828.771276][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 828.810983][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 828.848580][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 828.884089][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 828.945297][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 02:28:13 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 828.992321][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 829.030482][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 829.073696][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 829.123096][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 829.176277][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 829.212682][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 829.252649][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 829.262491][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 829.334240][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 829.379430][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 02:28:13 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 829.420556][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 829.457316][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 829.533059][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 829.567826][T20785] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 829.600371][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 829.619752][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 02:28:13 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={0x0, 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 829.653695][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 829.683339][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 02:28:14 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:15 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:15 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:15 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:16 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:17 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:17 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), 0x0) 02:28:17 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:18 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:18 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:19 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:19 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 835.619735][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 835.675208][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 835.711251][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 835.746393][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 835.787847][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 835.833798][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 835.880896][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 835.927655][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 835.962917][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 836.014368][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 836.047402][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 836.092711][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 836.132199][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 836.169847][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 836.209546][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 836.250028][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 836.291492][T20785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 836.328319][T20785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 836.379813][T20785] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 836.387272][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 836.406940][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 836.447138][T20785] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 836.467294][T20785] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 836.502985][T20785] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 836.511733][T20785] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 02:28:21 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:21 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:21 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), 0x0) 02:28:21 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:22 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:23 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:24 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:24 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), 0x0) 02:28:24 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:25 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:26 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:26 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:26 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:27 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) 02:28:28 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:28 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:28 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 845.712864][ T3568] Bluetooth: hci5: command 0x0409 tx timeout 02:28:30 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) 02:28:30 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:31 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:31 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x0, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 847.793690][ T3568] Bluetooth: hci5: command 0x041b tx timeout 02:28:33 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) [ 849.306830][T21807] chnl_net:caif_netlink_parms(): no params data found [ 849.872852][T17215] Bluetooth: hci5: command 0x040f tx timeout 02:28:34 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:35 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x0, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 851.965905][T20726] Bluetooth: hci5: command 0x0419 tx timeout 02:28:37 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec") 02:28:38 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x0, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:38 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:39 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec") 02:28:39 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:40 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:41 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec") 02:28:41 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 859.446764][T21807] bridge0: port 1(bridge_slave_0) entered blocking state [ 859.480864][T21807] bridge0: port 1(bridge_slave_0) entered disabled state [ 859.503783][T21807] device bridge_slave_0 entered promiscuous mode [ 859.543981][T21807] bridge0: port 2(bridge_slave_1) entered blocking state [ 859.551164][T21807] bridge0: port 2(bridge_slave_1) entered disabled state [ 859.600847][T21807] device bridge_slave_1 entered promiscuous mode 02:28:44 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:44 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:45 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f7") 02:28:47 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:47 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440), 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:48 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f7") 02:28:48 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440), 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:48 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 866.830620][T21807] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 866.861081][T21807] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:28:51 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440), 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:51 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:52 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f7") 02:28:53 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:53 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b3210", 0x62, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 869.610145][T21807] team0: Port device team_slave_0 added [ 869.640085][T21807] team0: Port device team_slave_1 added [ 869.866971][ T1378] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.873340][ T1378] ieee802154 phy1 wpan1: encryption failed: -22 02:28:54 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 872.372055][T21807] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 872.379096][T21807] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 872.469120][T21807] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 02:28:56 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f47") [ 872.582431][T21807] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 872.599403][T21807] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 872.692980][T21807] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 872.742669][ T3578] Bluetooth: hci1: command 0x0409 tx timeout 02:28:57 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b3210", 0x62, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:58 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r0, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:28:59 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f47") [ 874.833038][T17215] Bluetooth: hci1: command 0x041b tx timeout 02:28:59 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b3210", 0x62, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 876.903088][T20726] Bluetooth: hci1: command 0x040f tx timeout 02:29:01 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f47") 02:29:03 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 878.982706][ T3568] Bluetooth: hci1: command 0x0419 tx timeout 02:29:03 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaa", 0x93, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:29:03 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c5") 02:29:05 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c5") [ 881.926116][T21807] device hsr_slave_0 entered promiscuous mode 02:29:07 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaa", 0x93, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:29:07 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 883.257703][T21807] device hsr_slave_1 entered promiscuous mode 02:29:07 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c5") [ 884.697269][T21807] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 884.732006][T21807] Cannot create hsr debugfs directory 02:29:09 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaa", 0x93, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:29:10 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:29:11 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0d") 02:29:12 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c1", 0xac, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 889.526527][T22185] chnl_net:caif_netlink_parms(): no params data found 02:29:14 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0d") 02:29:14 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 891.363284][ T154] device hsr_slave_0 left promiscuous mode [ 891.778832][ T154] device hsr_slave_1 left promiscuous mode 02:29:16 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0d") [ 892.665828][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 892.689853][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 02:29:17 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 893.068706][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 893.082634][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 02:29:17 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 893.138171][ T154] device bridge_slave_1 left promiscuous mode [ 893.178653][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 893.978632][ T154] device bridge_slave_0 left promiscuous mode [ 893.997422][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 894.336697][ T154] device hsr_slave_0 left promiscuous mode [ 894.437716][ T154] device hsr_slave_1 left promiscuous mode [ 895.140225][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 895.153174][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 02:29:19 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 895.993357][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 896.000837][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 896.336529][ T154] device bridge_slave_1 left promiscuous mode [ 896.352849][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 02:29:20 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 896.396460][ T154] device bridge_slave_0 left promiscuous mode [ 896.424992][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 02:29:21 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 898.693893][ T154] device hsr_slave_0 left promiscuous mode 02:29:23 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 899.793461][ T154] device hsr_slave_1 left promiscuous mode 02:29:24 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 900.825703][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 900.835966][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 901.411840][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 901.430568][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 02:29:26 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 902.193078][ T154] device bridge_slave_1 left promiscuous mode [ 902.199318][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 02:29:26 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 903.954598][ T154] device bridge_slave_0 left promiscuous mode [ 903.960875][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 02:29:29 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 906.014475][ T154] device hsr_slave_0 left promiscuous mode [ 906.310240][ T154] device hsr_slave_1 left promiscuous mode 02:29:30 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 907.485610][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 907.503466][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 907.730619][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 907.750243][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 907.970292][ T154] device bridge_slave_1 left promiscuous mode [ 907.976577][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 02:29:32 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 908.158351][ T154] device bridge_slave_0 left promiscuous mode [ 908.172797][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 02:29:33 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 909.874801][ T154] device veth1_macvtap left promiscuous mode [ 909.880874][ T154] device veth0_macvtap left promiscuous mode [ 909.905416][ T154] device veth1_vlan left promiscuous mode [ 909.911268][ T154] device veth0_vlan left promiscuous mode 02:29:34 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 911.712893][ T3568] Bluetooth: hci0: command 0x0409 tx timeout 02:29:37 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c1", 0xac, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r4, 0xfffffffd, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0xf, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000cc0)='syzkaller\x00', 0x400, 0xf5, &(0x7f0000000d00)=""/245, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000e00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x3, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r4, r5, r4, r4, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0x2, 0xa}, {0x3, 0x3, 0x10}, {0x1, 0x2, 0xc, 0x9}, {0x4, 0x5, 0x7, 0x7}, {0x5, 0x2, 0x5, 0xa}, {0x4, 0x5, 0xc, 0x4}, {0x3, 0x2, 0xd}], 0x10, 0x80}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000880), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}, 0x10040) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 913.182908][ T154] device veth1_macvtap left promiscuous mode [ 913.189032][ T154] device veth0_macvtap left promiscuous mode [ 913.215715][ T154] device veth1_vlan left promiscuous mode 02:29:37 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 913.235690][ T154] device veth0_vlan left promiscuous mode 02:29:37 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:29:37 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 913.782574][ T3578] Bluetooth: hci0: command 0x041b tx timeout 02:29:38 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 915.862642][ T3578] Bluetooth: hci0: command 0x040f tx timeout [ 916.822573][T18414] Bluetooth: hci6: command 0x0409 tx timeout 02:29:41 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 917.030186][ T154] device veth1_macvtap left promiscuous mode [ 917.039389][ T154] device veth0_macvtap left promiscuous mode [ 917.059338][ T154] device veth1_vlan left promiscuous mode [ 917.081895][ T154] device veth0_vlan left promiscuous mode 02:29:41 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 917.942779][ T3568] Bluetooth: hci0: command 0x0419 tx timeout [ 918.902707][ T3568] Bluetooth: hci6: command 0x041b tx timeout 02:29:43 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 919.922837][ T154] device veth1_macvtap left promiscuous mode [ 919.929508][ T154] device veth0_macvtap left promiscuous mode [ 919.978216][ T154] device veth1_vlan left promiscuous mode [ 919.984130][ T154] device veth0_vlan left promiscuous mode 02:29:44 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 920.982747][ T3538] Bluetooth: hci6: command 0x040f tx timeout 02:29:45 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 923.072524][ T3538] Bluetooth: hci6: command 0x0419 tx timeout 02:29:47 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:29:48 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:29:49 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:29:51 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:29:51 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:29:53 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:29:54 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 931.305958][ T1378] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.312284][ T1378] ieee802154 phy1 wpan1: encryption failed: -22 02:29:56 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:29:56 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:29:57 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:29:57 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:29:59 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:00 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:02 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:02 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 938.832972][ T3568] Bluetooth: hci7: command 0x0409 tx timeout 02:30:04 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:04 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 940.902803][ T1068] Bluetooth: hci7: command 0x041b tx timeout 02:30:07 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r2, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 942.982555][ T3578] Bluetooth: hci7: command 0x040f tx timeout 02:30:07 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 945.062581][T18414] Bluetooth: hci7: command 0x0419 tx timeout 02:30:10 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:11 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:12 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:12 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:14 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:16 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:16 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={0x0, 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:17 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={0x0, 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:17 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:20 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={0x0, 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:20 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:22 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:22 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:23 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:24 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:26 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:27 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:27 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:30 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:31 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:31 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:32 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x0, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:32 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 969.083428][ T154] team0 (unregistering): Port device team_slave_1 removed [ 969.101164][ T154] team0 (unregistering): Port device team_slave_0 removed [ 969.144679][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 969.222888][ T1068] Bluetooth: hci5: command 0x0406 tx timeout [ 969.314485][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:30:34 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x0, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:34 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:35 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x0, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:36 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:36 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:38 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:38 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 974.223318][ T154] bond0 (unregistering): Released all slaves 02:30:39 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:40 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:40 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440), 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:41 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:41 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440), 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 977.702594][ T3578] Bluetooth: hci8: command 0x0409 tx timeout 02:30:42 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440), 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 979.782625][ T1068] Bluetooth: hci8: command 0x041b tx timeout 02:30:44 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b3210", 0x62, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:44 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:45 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b3210", 0x62, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 981.862646][T18414] Bluetooth: hci8: command 0x040f tx timeout 02:30:46 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:46 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b3210", 0x62, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 982.902676][ T1068] Bluetooth: hci9: command 0x0409 tx timeout 02:30:48 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaa", 0x93, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 983.984056][T20726] Bluetooth: hci8: command 0x0419 tx timeout 02:30:48 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 984.992758][ T3538] Bluetooth: hci9: command 0x041b tx timeout 02:30:49 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaa", 0x93, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:50 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaa", 0x93, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 987.062784][T20726] Bluetooth: hci9: command 0x040f tx timeout 02:30:51 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:51 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c1", 0xac, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:52 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:30:53 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c1", 0xac, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 989.142917][T20726] Bluetooth: hci9: command 0x0419 tx timeout [ 989.322840][ T154] team0 (unregistering): Port device team_slave_1 removed 02:30:53 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 989.393395][ T154] team0 (unregistering): Port device team_slave_0 removed [ 990.424840][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 991.427490][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:30:55 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c1", 0xac, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:55 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 992.746527][ T1378] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.752874][ T1378] ieee802154 phy1 wpan1: encryption failed: -22 02:30:58 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0", 0xb8, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:30:58 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 994.822710][ T1068] Bluetooth: hci1: command 0x0406 tx timeout 02:30:59 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0", 0xb8, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 996.153324][ T154] bond0 (unregistering): Released all slaves 02:31:00 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:02 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:03 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0", 0xb8, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:03 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:05 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:05 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:06 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:06 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:08 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:09 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 1004.822640][T18414] Bluetooth: hci4: command 0x0409 tx timeout [ 1006.902530][T17674] Bluetooth: hci4: command 0x041b tx timeout 02:31:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:11 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749", 0xc1, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 1007.463797][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1008.058344][ T154] team0 (unregistering): Port device team_slave_0 removed 02:31:12 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749", 0xc1, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 1008.837335][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1008.982538][T18414] Bluetooth: hci4: command 0x040f tx timeout 02:31:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 1010.143178][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:31:14 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749", 0xc1, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 1011.062617][ T3578] Bluetooth: hci4: command 0x0419 tx timeout 02:31:16 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f", 0xc3, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:16 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:17 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:18 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f", 0xc3, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:19 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 1015.430112][ T154] bond0 (unregistering): Released all slaves 02:31:20 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f", 0xc3, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:20 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:22 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, 0x0, &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:23 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:23 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, 0x0, &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:24 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:25 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, 0x0, &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:26 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:27 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), 0x0, &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:28 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), 0x0, &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:28 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 1024.164487][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1024.916055][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1025.443756][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 02:31:29 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:30 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), 0x0, &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccddeb145") r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 1026.756518][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 02:31:31 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:32 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:33 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") 02:31:34 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:35 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") 02:31:36 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 1033.062778][ T26] INFO: task syz-executor.3:21807 blocked for more than 143 seconds. [ 1033.071170][ T26] Not tainted 5.15.148-syzkaller #0 [ 1033.100677][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1033.122481][ T26] task:syz-executor.3 state:D stack:21624 pid:21807 ppid: 1 flags:0x00004006 [ 1033.131751][ T26] Call Trace: [ 1033.149423][ T26] [ 1033.152409][ T26] __schedule+0x12c4/0x45b0 [ 1033.162522][ T26] ? release_firmware_map_entry+0x18b/0x18b [ 1033.168459][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1033.192526][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1033.197875][ T26] schedule+0x11b/0x1f0 [ 1033.202059][ T26] schedule_preempt_disabled+0xf/0x20 [ 1033.217861][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1033.226043][ T26] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1033.231297][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1033.249434][ T26] mutex_lock_nested+0x17/0x20 [ 1033.272521][ T26] rtnetlink_rcv_msg+0x94c/0xee0 [ 1033.277520][ T26] ? reacquire_held_locks+0x660/0x660 [ 1033.287346][ T26] ? rtnetlink_bind+0x80/0x80 [ 1033.292083][ T26] ? is_bpf_text_address+0x24f/0x260 [ 1033.309237][ T26] ? stack_trace_save+0x1c0/0x1c0 [ 1033.317958][ T154] bond0 (unregistering): Released all slaves [ 1033.332780][ T26] ? __kernel_text_address+0x94/0x100 [ 1033.338283][ T26] ? unwind_get_return_address+0x49/0x80 [ 1033.352530][ T26] ? arch_stack_walk+0xf3/0x140 [ 1033.357454][ T26] ? mark_lock+0x98/0x340 [ 1033.382553][ T26] ? mark_lock+0x98/0x340 [ 1033.387449][ T26] ? __lock_acquire+0x1295/0x1ff0 [ 1033.404393][ T26] netlink_rcv_skb+0x1cf/0x410 [ 1033.409277][ T26] ? rtnetlink_bind+0x80/0x80 [ 1033.414621][ T26] ? netlink_ack+0xb10/0xb10 [ 1033.419260][ T26] netlink_unicast+0x7b6/0x980 [ 1033.431395][ T26] ? netlink_detachskb+0x90/0x90 [ 1033.442481][ T26] ? 0xffffffff81000000 [ 1033.446678][ T26] ? __check_object_size+0x300/0x410 [ 1033.452076][ T26] ? bpf_lsm_netlink_send+0x5/0x10 [ 1033.468318][ T26] netlink_sendmsg+0xa30/0xd60 [ 1033.482719][ T26] ? netlink_getsockopt+0x5b0/0x5b0 [ 1033.488482][ T26] ? aa_sock_msg_perm+0x91/0x150 [ 1033.500988][ T26] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1033.506679][ T26] ? security_socket_sendmsg+0x7d/0xa0 [ 1033.512234][ T26] ? netlink_getsockopt+0x5b0/0x5b0 [ 1033.542974][ T26] __sys_sendto+0x564/0x720 [ 1033.550039][ T26] ? __ia32_sys_getpeername+0x80/0x80 [ 1033.562575][ T26] ? rcu_is_watching+0x11/0xa0 [ 1033.568952][ T26] ? print_irqtrace_events+0x210/0x210 [ 1033.587876][ T26] ? vtime_user_exit+0x2d1/0x400 [ 1033.601612][ T26] __x64_sys_sendto+0xda/0xf0 [ 1033.631832][ T26] do_syscall_64+0x3d/0xb0 [ 1033.636806][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1033.652793][ T26] RIP: 0033:0x7f19805dea9c [ 1033.657253][ T26] RSP: 002b:00007ffe0d7e0e80 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1033.679372][ T26] RAX: ffffffffffffffda RBX: 00007f1981234620 RCX: 00007f19805dea9c [ 1033.710595][ T26] RDX: 0000000000000064 RSI: 00007f1981234670 RDI: 0000000000000003 [ 1033.731669][ T26] RBP: 0000000000000000 R08: 00007ffe0d7e0ed4 R09: 000000000000000c [ 1033.752587][ T26] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1033.760613][ T26] R13: 0000000000000000 R14: 00007f1981234670 R15: 0000000000000000 02:31:38 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 1033.833271][ T26] [ 1033.839719][ T26] INFO: task syz-executor.1:22185 blocked for more than 144 seconds. [ 1033.882283][ T26] Not tainted 5.15.148-syzkaller #0 [ 1033.897157][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1033.936807][ T26] task:syz-executor.1 state:D stack:21624 pid:22185 ppid: 1 flags:0x00004006 [ 1033.964496][ T26] Call Trace: [ 1033.977612][ T26] [ 1033.992475][ T26] __schedule+0x12c4/0x45b0 [ 1033.997541][ T26] ? release_firmware_map_entry+0x18b/0x18b [ 1034.014715][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1034.021756][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1034.052489][ T26] schedule+0x11b/0x1f0 [ 1034.057199][ T26] schedule_preempt_disabled+0xf/0x20 [ 1034.066943][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1034.072202][ T26] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1034.091875][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1034.108599][ T26] mutex_lock_nested+0x17/0x20 [ 1034.132760][ T26] rtnetlink_rcv_msg+0x94c/0xee0 [ 1034.137755][ T26] ? reacquire_held_locks+0x660/0x660 [ 1034.152518][ T26] ? rtnetlink_bind+0x80/0x80 [ 1034.157237][ T26] ? is_bpf_text_address+0x24f/0x260 [ 1034.182810][ T26] ? stack_trace_save+0x1c0/0x1c0 [ 1034.187904][ T26] ? __kernel_text_address+0x94/0x100 [ 1034.218584][ T26] ? unwind_get_return_address+0x49/0x80 [ 1034.235688][ T26] ? arch_stack_walk+0xf3/0x140 [ 1034.240601][ T26] ? mark_lock+0x98/0x340 [ 1034.261969][ T26] ? mark_lock+0x98/0x340 [ 1034.268579][ T26] ? __lock_acquire+0x1295/0x1ff0 [ 1034.292605][ T26] netlink_rcv_skb+0x1cf/0x410 [ 1034.302729][ T26] ? rtnetlink_bind+0x80/0x80 [ 1034.322472][ T26] ? netlink_ack+0xb10/0xb10 [ 1034.327741][ T26] netlink_unicast+0x7b6/0x980 [ 1034.353408][ T26] ? netlink_detachskb+0x90/0x90 [ 1034.358417][ T26] ? 0xffffffff81000000 [ 1034.366570][ T26] ? __check_object_size+0x300/0x410 [ 1034.382617][ T26] ? bpf_lsm_netlink_send+0x5/0x10 [ 1034.392733][ T26] netlink_sendmsg+0xa30/0xd60 [ 1034.397556][ T26] ? netlink_getsockopt+0x5b0/0x5b0 [ 1034.420834][ T26] ? aa_sock_msg_perm+0x91/0x150 [ 1034.437915][ T26] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1034.452496][ T26] ? security_socket_sendmsg+0x7d/0xa0 [ 1034.462714][ T26] ? netlink_getsockopt+0x5b0/0x5b0 [ 1034.467966][ T26] __sys_sendto+0x564/0x720 02:31:38 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc={0x27, 0x0, 0x8}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8bbc749976f15", 0xc4, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x10000, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2, 0x4, 0x7, 0x29, 0x680, r3, 0xfffffffd, '\x00', 0x0, r1, 0x1, 0x2, 0x2}, 0xfffffffffffffec5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x28000, &(0x7f00000008c0)="77383738bf8c956f8c1ba98837da9de7815e9c6acd509fac4bd86816950dd87dacc7196cfd687aaa250434374c2d0126d0dbe0da9ddbce3ce63c2555fdbef312853750b7dedb6db725189eb8fb7d44e5fc8dcd218a6fc2bf53aa7f1ee90a", 0x5e, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037c1") [ 1034.491493][ T26] ? __ia32_sys_getpeername+0x80/0x80 [ 1034.502645][ T26] ? rcu_is_watching+0x11/0xa0 [ 1034.507464][ T26] ? print_irqtrace_events+0x210/0x210 [ 1034.525830][ T26] ? vtime_user_exit+0x2d1/0x400 [ 1034.530833][ T26] __x64_sys_sendto+0xda/0xf0 [ 1034.552353][ T26] do_syscall_64+0x3d/0xb0 [ 1034.558649][ T26] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1034.581180][ T26] RIP: 0033:0x7ff494003a9c [ 1034.586657][ T26] RSP: 002b:00007fff96a5d070 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1034.609908][ T26] RAX: ffffffffffffffda RBX: 00007ff494c59620 RCX: 00007ff494003a9c [ 1034.631233][ T26] RDX: 000000000000002c RSI: 00007ff494c59670 RDI: 0000000000000003 [ 1034.662573][ T26] RBP: 0000000000000000 R08: 00007fff96a5d0c4 R09: 000000000000000c [ 1034.670595][ T26] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1034.699152][ T26] R13: 0000000000000000 R14: 00007ff494c59670 R15: 0000000000000000 [ 1034.716584][ T26] [ 1034.719802][ T26] [ 1034.719802][ T26] Showing all locks held in the system: [ 1034.737686][ T26] 1 lock held by khungtaskd/26: [ 1034.752539][ T26] #0: ffffffff8c91f220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1034.768663][ T26] 5 locks held by kworker/u4:2/154: [ 1034.802301][ T26] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1034.829467][ T26] #1: ffffc90001ac7d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1034.855955][ T26] #2: ffffffff8d9ced10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1034.879040][ T26] #3: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 [ 1034.902464][ T26] #4: ffffffff8c9236f0 (rcu_state.barrier_mutex){+.+.}-{3:3}, at: rcu_barrier+0x9c/0x4e0 [ 1034.930032][ T26] 3 locks held by kworker/0:2/1068: [ 1034.936092][ T26] #0: ffff8880234f8138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1034.962626][ T26] #1: ffffc9000460fd20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1034.982363][ T26] #2: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 1035.005568][ T26] 2 locks held by getty/3258: [ 1035.017740][ T26] #0: ffff88814b805098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1035.044123][ T26] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1035.065739][ T26] 3 locks held by kworker/0:3/3306: [ 1035.071068][ T26] #0: ffff888011c70d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1035.091730][ T26] #1: ffffc90002b77d20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1035.122675][ T26] #2: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1035.152690][ T26] 5 locks held by kworker/u4:7/15806: [ 1035.158115][ T26] #0: ffff8881443fc138 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1035.217071][ T26] #1: ffffc9000481fd20 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1035.243970][ T26] #2: ffff88814ba020e0 (&type->s_umount_key#32){++++}-{3:3}, at: trylock_super+0x1b/0xf0 [ 1035.280106][ T26] #3: ffff88814ba04bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1035.302745][ T26] #4: ffff88814ba06990 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0x12b9/0x1570 [ 1035.332694][ T26] 3 locks held by kworker/0:7/17839: [ 1035.338102][ T26] #0: ffff888011c70d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1035.376369][ T26] #1: ffffc90003fc7d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1035.396076][ T26] #2: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1035.420456][ T26] 3 locks held by kworker/u4:4/17940: [ 1035.432732][ T26] 2 locks held by kworker/0:10/18414: [ 1035.438361][ T26] #0: ffff888011c72538 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1035.464799][ T26] #1: ffffc90003887d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1035.495646][ T26] 1 lock held by syz-executor.3/19966: [ 1035.525862][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1035.552785][ T26] 1 lock held by syz-executor.3/21807: [ 1035.562985][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1035.582329][ T26] 1 lock held by syz-executor.1/22185: [ 1035.602668][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1035.627346][ T26] 1 lock held by syz-executor.0/22398: [ 1035.643024][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1035.665674][ T26] 3 locks held by syz-executor.4/22417: [ 1035.681395][ T26] 1 lock held by syz-executor.2/22431: [ 1035.704037][ T26] 1 lock held by syz-executor.4/22442: [ 1035.709568][ T26] 1 lock held by syz-executor.2/22449: [ 1035.732631][ T26] 1 lock held by syz-executor.4/22452: [ 1035.738141][ T26] 2 locks held by syz-executor.4/22464: [ 1035.762467][ T26] 2 locks held by syz-executor.2/22469: [ 1035.772033][ T26] 1 lock held by syz-executor.4/22480: [ 1035.782628][T17674] Bluetooth: hci0: command 0x0406 tx timeout [ 1035.792725][ T26] 1 lock held by syz-executor.2/22572: [ 1035.803016][ T26] 1 lock held by syz-executor.4/22579: [ 1035.808512][ T26] 1 lock held by syz-executor.3/22581: [ 1035.832277][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1035.865586][ T26] 1 lock held by syz-executor.4/22696: [ 1035.871316][ T26] 2 locks held by syz-executor.2/22698: [ 1035.912466][ T26] 1 lock held by syz-executor.0/22705: [ 1035.917985][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1035.952489][ T26] 2 locks held by syz-executor.4/22709: [ 1035.958136][ T26] 2 locks held by syz-executor.4/22751: [ 1035.981453][ T26] 1 lock held by syz-executor.4/22763: [ 1035.987421][ T26] 2 locks held by syz-executor.2/22766: [ 1036.002485][ T26] 2 locks held by syz-executor.2/22778: [ 1036.008073][ T26] 1 lock held by syz-executor.4/22783: [ 1036.027237][ T26] 2 locks held by syz-executor.2/22787: [ 1036.050143][ T26] 1 lock held by syz-executor.4/22796: [ 1036.072350][ T26] #0: ffff88814ba04bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1036.093886][ T26] 1 lock held by syz-executor.2/22799: [ 1036.099391][ T26] 1 lock held by syz-executor.4/22810: [ 1036.122479][ T26] 1 lock held by syz-executor.2/22821: [ 1036.127986][ T26] 1 lock held by syz-executor.4/22831: [ 1036.144594][ T26] 1 lock held by syz-executor.1/22835: [ 1036.159471][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1036.178911][ T26] 3 locks held by syz-executor.2/22907: [ 1036.194255][ T26] 1 lock held by syz-executor.4/23102: [ 1036.199749][ T26] 1 lock held by syz-executor.2/23246: [ 1036.220718][ T26] 1 lock held by syz-executor.4/23253: [ 1036.248306][ T26] 1 lock held by syz-executor.2/23257: [ 1036.254809][ T26] 1 lock held by syz-executor.4/23266: [ 1036.260418][ T26] #0: ffff88814ba04bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1036.302531][ T26] 1 lock held by syz-executor.2/23270: [ 1036.308036][ T26] 1 lock held by syz-executor.2/23276: [ 1036.328777][ T26] 1 lock held by syz-executor.4/23281: [ 1036.342458][ T26] 1 lock held by syz-executor.2/23284: [ 1036.347960][ T26] 1 lock held by syz-executor.4/23310: [ 1036.365016][ T26] 1 lock held by syz-executor.3/23313: [ 1036.385392][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1036.408647][ T26] 2 locks held by syz-executor.4/23322: [ 1036.430431][ T26] 1 lock held by syz-executor.2/23325: [ 1036.436368][ T26] 1 lock held by syz-executor.2/23330: [ 1036.442041][ T26] 1 lock held by syz-executor.2/23342: [ 1036.472313][ T26] 1 lock held by syz-executor.0/23349: [ 1036.482460][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1036.491999][ T26] 1 lock held by syz-executor.2/23353: [ 1036.527643][ T26] 2 locks held by syz-executor.2/23362: [ 1036.539318][ T26] 2 locks held by syz-executor.2/23374: [ 1036.556536][ T26] 1 lock held by syz-executor.4/23376: [ 1036.580450][ T26] 1 lock held by syz-executor.2/23383: [ 1036.601882][ T26] 1 lock held by syz-executor.2/23391: [ 1036.611162][ T26] 1 lock held by syz-executor.2/23397: [ 1036.623891][ T26] 1 lock held by syz-executor.1/23600: [ 1036.629456][ T26] #0: ffffffff8d9da8c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1036.676384][ T26] 4 locks held by syz-executor.4/23780: [ 1036.692471][ T26] 2 locks held by syz-executor.4/23790: [ 1036.698361][ T26] 5 locks held by syz-executor.2/23795: [ 1036.710135][ T26] 2 locks held by syz-executor.4/23805: [ 1036.727390][ T26] 4 locks held by syz-executor.2/23813: [ 1036.747316][ T26] 4 locks held by syz-executor.4/23892: [ 1036.762546][ T26] 3 locks held by syz-executor.4/23945: [ 1036.768682][ T26] 2 locks held by syz-executor.2/23947: [ 1036.797552][ T26] 1 lock held by syz-executor.4/23953: [ 1036.805423][ T26] #0: ffffffff8c9237e8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x280/0x740 [ 1036.832907][ T26] 2 locks held by syz-executor.2/23959: [ 1036.838606][ T26] [ 1036.840957][ T26] ============================================= [ 1036.840957][ T26] [ 1036.892469][ T26] NMI backtrace for cpu 1 [ 1036.896946][ T26] CPU: 1 PID: 26 Comm: khungtaskd Not tainted 5.15.148-syzkaller #0 [ 1036.904951][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1036.915032][ T26] Call Trace: [ 1036.918335][ T26] [ 1036.921286][ T26] dump_stack_lvl+0x1e3/0x2cb [ 1036.925995][ T26] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1036.931659][ T26] ? panic+0x84d/0x84d [ 1036.935848][ T26] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1036.941124][ T26] nmi_cpu_backtrace+0x46a/0x4a0 [ 1036.946098][ T26] ? __wake_up_klogd+0xd5/0x100 [ 1036.951010][ T26] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1036.957197][ T26] ? _printk+0xd1/0x111 [ 1036.961380][ T26] ? panic+0x84d/0x84d [ 1036.965478][ T26] ? __wake_up_klogd+0xcc/0x100 [ 1036.970356][ T26] ? panic+0x84d/0x84d [ 1036.974460][ T26] ? __rcu_read_unlock+0x92/0x100 [ 1036.979513][ T26] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1036.985756][ T26] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1036.991772][ T26] watchdog+0xe72/0xeb0 [ 1036.996049][ T26] kthread+0x3f6/0x4f0 [ 1037.000145][ T26] ? hungtask_pm_notify+0x50/0x50 [ 1037.005213][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1037.009835][ T26] ret_from_fork+0x1f/0x30 [ 1037.014352][ T26] [ 1037.018360][ T26] Sending NMI from CPU 1 to CPUs 0: [ 1037.024488][ C0] NMI backtrace for cpu 0 [ 1037.024499][ C0] CPU: 0 PID: 4686 Comm: kworker/u4:6 Not tainted 5.15.148-syzkaller #0 [ 1037.024517][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1037.024527][ C0] Workqueue: ext4-rsv-conversion ext4_end_io_rsv_work [ 1037.024552][ C0] RIP: 0010:unwind_next_frame+0xab7/0x1fa0 [ 1037.024575][ C0] Code: df 4d 8b 77 08 49 8d 7f 10 48 89 f8 48 c1 e8 03 80 3c 10 00 74 0f e8 b8 71 91 00 48 ba 00 00 00 00 00 fc ff df 48 89 5c 24 58 <49> 8b 6f 10 48 8b 44 24 38 0f b6 04 10 84 c0 0f 85 80 0f 00 00 48 [ 1037.024589][ C0] RSP: 0018:ffffc900010ff568 EFLAGS: 00000246 [ 1037.024603][ C0] RAX: 1ffff9200021fec6 RBX: ffffffff8e6349df RCX: ffffffff8df8ac8c [ 1037.024616][ C0] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffffc900010ff630 [ 1037.024628][ C0] RBP: ffffffff8e6349de R08: 000000000000000b R09: ffffc900010ff710 [ 1037.024639][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffffffff1cc693b [ 1037.024651][ C0] R13: 1ffffffff1cc693b R14: ffffc900010f8000 R15: ffffc900010ff620 [ 1037.024663][ C0] FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 1037.024678][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1037.024697][ C0] CR2: 00007f11fa0e6988 CR3: 000000005bff2000 CR4: 00000000003506f0 [ 1037.024711][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1037.024721][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1037.024731][ C0] Call Trace: [ 1037.024735][ C0] [ 1037.024741][ C0] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1037.024762][ C0] ? read_lock_is_recursive+0x10/0x10 [ 1037.024783][ C0] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1037.024803][ C0] ? unknown_nmi_error+0xd0/0xd0 [ 1037.024894][ C0] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1037.024910][ C0] ? nmi_handle+0xf7/0x370 [ 1037.024927][ C0] ? unwind_next_frame+0xab7/0x1fa0 [ 1037.024944][ C0] ? default_do_nmi+0x62/0x150 [ 1037.024964][ C0] ? exc_nmi+0xab/0x120 [ 1037.024981][ C0] ? end_repeat_nmi+0x16/0x31 [ 1037.025005][ C0] ? unwind_next_frame+0xab7/0x1fa0 [ 1037.025023][ C0] ? unwind_next_frame+0xab7/0x1fa0 02:31:41 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b80)=@nfc, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400), 0x10) syz_clone(0x1000, &(0x7f0000000440)="b8116cbd7114649eb6cecbca35323a4e23b6c14ccfcbad64cd9852448cf0ae324302361baaf06ecf47a625a534bfca8b5c5a2f2bc22603477ac1b466472621353f55c94b7a43f5fcb91fbbf532270d3839a34d78b6afeda99cc7d934bfc88b7b321075e9173444e6c2cafe5de2233cff77b99d7045146186a767f94b5be5a180c20ba801b32e921d793a14a30c42d5503f7eaac398a210d96f1c1733c037730f36c11723b3b11282133ef7c10679f33056d131eaa91595e0886a419671b8", 0xbe, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="59ce7760a1f105ab8dd874c29228e04727d3f1f56f341d28355e5c489c1c2e6a203fd87ac609f886e4c3f634f677ccd33d023dc35547b5fc05f57d01a16b8c45805e24758ccdde") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{}, 0x0, &(0x7f0000000780)='%-5lx \x00'}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0x28000, 0x0, 0x0, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="f207485cf6951630cce2fd292dd5a6a657f4fe84c4a8167c66501442d70ced4deb669ecd813521b591df13cf0c083a8172a5e926d5a1f0b86d21f57c0e6b4aec6be4a0637cd9aac25ecc615566edff83a10245ef43b6cc5da2dad0f54dfe07f79b6cd69442123ed4c1dad4e7264e6f475bdc589655e339c54bbe6a0dd037") [ 1037.025040][ C0] ? unwind_next_frame+0xab7/0x1fa0 [ 1037.025057][ C0] [ 1037.025061][ C0] [ 1037.025069][ C0] ? slab_free_freelist_hook+0xdd/0x160 [ 1037.025115][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 1037.025132][ C0] arch_stack_walk+0x10d/0x140 [ 1037.025152][ C0] ? slab_free_freelist_hook+0xdd/0x160 [ 1037.025172][ C0] stack_trace_save+0x113/0x1c0 [ 1037.025190][ C0] ? stack_trace_snprint+0xe0/0xe0 [ 1037.025211][ C0] ? kmem_cache_free+0x91/0x1f0 [ 1037.025226][ C0] kasan_set_track+0x4b/0x80 [ 1037.025243][ C0] ? kasan_set_track+0x4b/0x80 [ 1037.025259][ C0] ? kasan_set_free_info+0x1f/0x40 [ 1037.025273][ C0] ? ____kasan_slab_free+0xd8/0x120 [ 1037.025290][ C0] ? slab_free_freelist_hook+0xdd/0x160 [ 1037.025330][ C0] kasan_set_free_info+0x1f/0x40 [ 1037.025345][ C0] ____kasan_slab_free+0xd8/0x120 [ 1037.025364][ C0] slab_free_freelist_hook+0xdd/0x160 [ 1037.025382][ C0] ? bio_free+0xc5/0x1a0 [ 1037.025444][ C0] kmem_cache_free+0x91/0x1f0 [ 1037.025463][ C0] bio_free+0xc5/0x1a0 [ 1037.025480][ C0] ext4_release_io_end+0xe7/0x2c0 [ 1037.025497][ C0] ? ext4_convert_unwritten_io_end_vec+0x151/0x170 [ 1037.025516][ C0] ext4_end_io_rsv_work+0x5d6/0x6e0 [ 1037.025537][ C0] ? print_irqtrace_events+0x210/0x210 [ 1037.025556][ C0] ? ext4_last_io_end_vec+0x70/0x70 [ 1037.025578][ C0] process_one_work+0x8a1/0x10c0 [ 1037.025602][ C0] ? worker_detach_from_pool+0x260/0x260 [ 1037.025621][ C0] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1037.025637][ C0] ? kthread_data+0x4e/0xc0 [ 1037.025652][ C0] ? wq_worker_running+0x97/0x170 [ 1037.025669][ C0] worker_thread+0xaca/0x1280 [ 1037.025691][ C0] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1037.025718][ C0] kthread+0x3f6/0x4f0 [ 1037.025732][ C0] ? rcu_lock_release+0x20/0x20 [ 1037.025748][ C0] ? kthread_blkcg+0xd0/0xd0 [ 1037.025763][ C0] ret_from_fork+0x1f/0x30 [ 1037.025787][ C0] [ 1037.428726][ T26] Kernel panic - not syncing: hung_task: blocked tasks [ 1037.435605][ T26] CPU: 1 PID: 26 Comm: khungtaskd Not tainted 5.15.148-syzkaller #0 [ 1037.443611][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1037.453805][ T26] Call Trace: [ 1037.457112][ T26] [ 1037.460059][ T26] dump_stack_lvl+0x1e3/0x2cb [ 1037.464778][ T26] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1037.470438][ T26] ? panic+0x84d/0x84d [ 1037.474540][ T26] panic+0x318/0x84d [ 1037.478453][ T26] ? schedule_preempt_disabled+0x20/0x20 [ 1037.484116][ T26] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1037.490303][ T26] ? fb_is_primary_device+0xcc/0xcc [ 1037.495529][ T26] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1037.501624][ T26] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1037.507803][ T26] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1037.513986][ T26] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1037.520346][ T26] watchdog+0xeb0/0xeb0 [ 1037.524541][ T26] kthread+0x3f6/0x4f0 [ 1037.528636][ T26] ? hungtask_pm_notify+0x50/0x50 [ 1037.533687][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1037.538300][ T26] ret_from_fork+0x1f/0x30 [ 1037.542839][ T26] [ 1037.546104][ T26] Kernel Offset: disabled [ 1037.550589][ T26] Rebooting in 86400 seconds..