1e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x0, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:13:57 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x0, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:13:58 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x0, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:13:59 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x0, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 896.422681][ T9] team0 (unregistering): Port device team_slave_1 removed 21:14:00 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x0, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 896.955904][ T9] team0 (unregistering): Port device team_slave_0 removed 21:14:00 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x0, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 897.678332][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:14:01 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x0, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 898.431715][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:14:02 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x0, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:03 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x0, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:03 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x0, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 900.919823][ T9] bond0 (unregistering): Released all slaves 21:14:04 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 901.607156][ T9] team0 (unregistering): Port device team_slave_1 removed 21:14:05 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:05 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', 0x0, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 902.157111][ T9] team0 (unregistering): Port device team_slave_0 removed [ 902.708604][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:14:06 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 903.188940][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:14:07 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:07 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:08 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x0, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:09 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x0, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 905.986374][ T9] bond0 (unregistering): Released all slaves 21:14:09 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x0, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 906.861469][T28734] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 906.869802][T28734] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 906.877493][T28734] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 906.885920][T28734] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 906.898079][T28734] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 906.905510][T28734] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 21:14:10 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 907.233332][ T9] team0 (unregistering): Port device team_slave_1 removed 21:14:11 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 908.123217][ T9] team0 (unregistering): Port device team_slave_0 removed 21:14:12 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 908.688371][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 908.921361][T28734] Bluetooth: hci5: command 0x0409 tx timeout [ 909.151900][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:14:12 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:13 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:13 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 910.611687][ T9] bond0 (unregistering): Released all slaves [ 911.001215][T28734] Bluetooth: hci5: command 0x041b tx timeout [ 911.421561][T26727] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 911.430144][T26727] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 911.437965][T26727] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 911.445733][T26727] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 911.453474][T26727] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 911.460664][T26727] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 21:14:15 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 911.860551][T28734] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 911.869374][T28734] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 911.881729][T28734] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 911.891893][T28734] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 911.899365][T28734] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 911.906680][T28734] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 21:14:15 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 912.542725][ T9] team0 (unregistering): Port device team_slave_1 removed [ 912.998842][ T9] team0 (unregistering): Port device team_slave_0 removed [ 913.081282][T26727] Bluetooth: hci5: command 0x040f tx timeout [ 913.112336][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:14:16 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 913.251644][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 913.481235][T26727] Bluetooth: hci6: command 0x0409 tx timeout 21:14:17 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 913.961249][T26727] Bluetooth: hci7: command 0x0409 tx timeout 21:14:17 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 915.171288][T26727] Bluetooth: hci5: command 0x0419 tx timeout 21:14:18 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 915.561399][T26727] Bluetooth: hci6: command 0x041b tx timeout [ 915.976584][ T9] bond0 (unregistering): Released all slaves [ 916.041202][T26727] Bluetooth: hci7: command 0x041b tx timeout 21:14:19 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:20 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 917.641259][T26727] Bluetooth: hci6: command 0x040f tx timeout 21:14:21 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 918.062497][ T9] team0 (unregistering): Port device team_slave_1 removed [ 918.121253][T26727] Bluetooth: hci7: command 0x040f tx timeout [ 918.295528][ T9] team0 (unregistering): Port device team_slave_0 removed [ 918.580451][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:14:22 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 919.256014][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:14:22 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 919.722895][T26727] Bluetooth: hci6: command 0x0419 tx timeout [ 920.201244][T28734] Bluetooth: hci7: command 0x0419 tx timeout 21:14:23 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:24 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:25 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 922.350643][ T9] bond0 (unregistering): Released all slaves 21:14:25 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:26 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r3, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r4, &(0x7f00000007c0)=r6, 0x12) r7 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r5, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r4, r4, r7, r4], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 923.368671][ T9] team0 (unregistering): Port device team_slave_1 removed [ 923.919317][ T9] team0 (unregistering): Port device team_slave_0 removed 21:14:27 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r3, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r4, &(0x7f00000007c0)=r6, 0x12) r7 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r5, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r4, r4, r7, r4], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 924.242177][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 924.867203][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:14:28 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r3, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r4, &(0x7f00000007c0)=r6, 0x12) r7 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r5, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r4, r4, r7, r4], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:29 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={0x0, r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:30 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={0x0, r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 926.612071][ T9] bond0 (unregistering): Released all slaves 21:14:30 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={0x0, r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 927.592498][ T9] team0 (unregistering): Port device team_slave_1 removed 21:14:31 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r3, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', 0xffffffffffffffff, 0x4000, r4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r5, &(0x7f00000007c0)=r7, 0x12) r8 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r6, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r6, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r5, r5, r8, r5], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 928.296574][ T9] team0 (unregistering): Port device team_slave_0 removed [ 928.631577][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:14:32 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r3, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', 0xffffffffffffffff, 0x4000, r4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r5, &(0x7f00000007c0)=r7, 0x12) r8 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r6, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r6, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r5, r5, r8, r5], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 929.192592][T28734] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 929.202249][T28734] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 929.209861][T28734] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 929.218197][T28734] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 929.231513][T28734] Bluetooth: hci8: unexpected cc 0x0c25 length: 249 > 3 [ 929.238716][T28734] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 21:14:32 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r3, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', 0xffffffffffffffff, 0x4000, r4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r5, &(0x7f00000007c0)=r7, 0x12) r8 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r6, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r6, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r5, r5, r8, r5], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 930.173341][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:14:33 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r5, &(0x7f00000007c0)=r7, 0x12) r8 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r6, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r6, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r5, r5, r8, r5], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:34 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r5, &(0x7f00000007c0)=r7, 0x12) r8 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r6, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r6, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r5, r5, r8, r5], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 931.242695][ T1252] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.249004][ T1252] ieee802154 phy1 wpan1: encryption failed: -22 [ 931.321457][T28734] Bluetooth: hci8: command 0x0409 tx timeout [ 931.821867][ T9] bond0 (unregistering): Released all slaves 21:14:35 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r5, &(0x7f00000007c0)=r7, 0x12) r8 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r6, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r6, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r5, r5, r8, r5], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:36 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:36 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 933.401570][T28734] Bluetooth: hci8: command 0x041b tx timeout [ 933.610506][ T9] team0 (unregistering): Port device team_slave_1 removed 21:14:37 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 934.564698][ T9] team0 (unregistering): Port device team_slave_0 removed 21:14:38 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 935.257490][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:14:38 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 935.481473][T28734] Bluetooth: hci8: command 0x040f tx timeout [ 935.721608][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:14:39 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:40 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:40 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 937.561545][T28734] Bluetooth: hci8: command 0x0419 tx timeout 21:14:41 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 938.693173][ T9] bond0 (unregistering): Released all slaves 21:14:42 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:43 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:43 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 940.959848][ T9] team0 (unregistering): Port device team_slave_1 removed 21:14:44 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x0, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 941.121612][ T9] team0 (unregistering): Port device team_slave_0 removed [ 941.736173][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:14:45 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x0, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:46 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x0, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 942.622078][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:14:46 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:47 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:48 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 945.195368][ T9] bond0 (unregistering): Released all slaves 21:14:48 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 946.039476][ T9] team0 (unregistering): Port device team_slave_1 removed 21:14:49 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 946.202568][ T9] team0 (unregistering): Port device team_slave_0 removed [ 946.301385][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:14:50 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 947.035599][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:14:51 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:52 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:52 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 950.151734][ T9] bond0 (unregistering): Released all slaves 21:14:53 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x1, &(0x7f0000000000)=@raw=[@alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:54 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x1, &(0x7f0000000000)=@raw=[@alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:54 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x1, &(0x7f0000000000)=@raw=[@alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:56 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], 0x0, 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:57 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], 0x0, 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 954.304628][ T9] team0 (unregistering): Port device team_slave_1 removed 21:14:57 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], 0x0, 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:14:58 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0x0, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 954.779757][ T9] team0 (unregistering): Port device team_slave_0 removed [ 955.291789][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:14:59 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0x0, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 955.951535][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:14:59 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0x0, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:00 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:01 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 958.437671][ T9] bond0 (unregistering): Released all slaves 21:15:01 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:02 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:03 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:03 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:04 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:05 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 962.508065][ T9] team0 (unregistering): Port device team_slave_1 removed 21:15:06 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 962.751791][ T9] team0 (unregistering): Port device team_slave_0 removed [ 963.196689][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:15:06 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 963.711961][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 964.051337][T26727] Bluetooth: hci2: command 0x0406 tx timeout 21:15:07 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:08 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:09 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x0, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:10 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x0, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 966.861717][ T9] bond0 (unregistering): Released all slaves 21:15:11 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x0, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:11 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0x0, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 968.766732][ T9] team0 (unregistering): Port device team_slave_1 removed 21:15:12 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0x0, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 969.161194][T28734] Bluetooth: hci3: command 0x0406 tx timeout [ 969.167245][T28734] Bluetooth: hci4: command 0x0406 tx timeout [ 969.238163][ T9] team0 (unregistering): Port device team_slave_0 removed [ 969.526037][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:15:13 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0x0, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 970.046238][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:15:13 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x0, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:14 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x0, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:15 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x0, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:16 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 973.036923][T26727] Bluetooth: hci9: unexpected cc 0x0c03 length: 249 > 1 [ 973.047060][T26727] Bluetooth: hci9: unexpected cc 0x1003 length: 249 > 9 [ 973.055315][T26727] Bluetooth: hci9: unexpected cc 0x1001 length: 249 > 9 [ 973.063090][T26727] Bluetooth: hci9: unexpected cc 0x0c23 length: 249 > 4 [ 973.070569][T26727] Bluetooth: hci9: unexpected cc 0x0c25 length: 249 > 3 [ 973.078179][T26727] Bluetooth: hci9: unexpected cc 0x0c38 length: 249 > 2 [ 973.210781][ T9] bond0 (unregistering): Released all slaves 21:15:16 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:17 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 974.560061][ T9] team0 (unregistering): Port device team_slave_0 removed 21:15:18 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 975.068848][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 975.161133][T26727] Bluetooth: hci9: command 0x0409 tx timeout 21:15:18 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 975.844386][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:15:19 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:20 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 977.241261][T26727] Bluetooth: hci9: command 0x041b tx timeout [ 977.583833][T28734] Bluetooth: hci10: unexpected cc 0x0c03 length: 249 > 1 [ 977.592872][T28734] Bluetooth: hci10: unexpected cc 0x1003 length: 249 > 9 [ 977.600609][T28734] Bluetooth: hci10: unexpected cc 0x1001 length: 249 > 9 [ 977.609494][T28734] Bluetooth: hci10: unexpected cc 0x0c23 length: 249 > 4 [ 977.617283][T28734] Bluetooth: hci10: unexpected cc 0x0c25 length: 249 > 3 [ 977.625034][T28734] Bluetooth: hci10: unexpected cc 0x0c38 length: 249 > 2 [ 977.903882][T26727] Bluetooth: hci11: unexpected cc 0x0c03 length: 249 > 1 [ 977.912483][T26727] Bluetooth: hci11: unexpected cc 0x1003 length: 249 > 9 [ 977.920752][T26727] Bluetooth: hci11: unexpected cc 0x1001 length: 249 > 9 [ 977.928921][T26727] Bluetooth: hci11: unexpected cc 0x0c23 length: 249 > 4 [ 977.936517][T26727] Bluetooth: hci11: unexpected cc 0x0c25 length: 249 > 3 [ 977.944036][T26727] Bluetooth: hci11: unexpected cc 0x0c38 length: 249 > 2 21:15:21 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 979.151848][ T9] bond0 (unregistering): Released all slaves 21:15:22 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 979.321188][T26727] Bluetooth: hci9: command 0x040f tx timeout [ 979.641412][T26727] Bluetooth: hci10: command 0x0409 tx timeout [ 979.961151][T26727] Bluetooth: hci11: command 0x0409 tx timeout 21:15:23 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:24 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 980.913009][ T9] team0 (unregistering): Port device team_slave_1 removed [ 981.352056][ T9] team0 (unregistering): Port device team_slave_0 removed [ 981.411069][T26727] Bluetooth: hci9: command 0x0419 tx timeout 21:15:25 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 981.721245][T26727] Bluetooth: hci10: command 0x041b tx timeout [ 981.908678][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 982.051247][T26727] Bluetooth: hci11: command 0x041b tx timeout 21:15:25 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 982.260375][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:15:26 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:26 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 983.801209][T26727] Bluetooth: hci10: command 0x040f tx timeout [ 984.131120][T26727] Bluetooth: hci11: command 0x040f tx timeout 21:15:27 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:28 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 984.933120][ T9] bond0 (unregistering): Released all slaves 21:15:28 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 985.881620][T26727] Bluetooth: hci10: command 0x0419 tx timeout [ 986.201860][T28734] Bluetooth: hci11: command 0x0419 tx timeout 21:15:29 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:30 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:30 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:31 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 989.027419][ T9] team0 (unregistering): Port device team_slave_1 removed 21:15:32 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 989.301785][ T9] team0 (unregistering): Port device team_slave_0 removed [ 989.651225][T26727] Bluetooth: hci1: command 0x0406 tx timeout 21:15:33 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 990.042981][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:15:33 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x0, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 990.821901][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:15:34 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x0, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:35 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x0, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 992.692757][ T1252] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.699095][ T1252] ieee802154 phy1 wpan1: encryption failed: -22 21:15:36 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x0, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:37 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x0, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 994.651938][ T9] bond0 (unregistering): Released all slaves 21:15:38 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x0, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 995.311790][T28734] Bluetooth: hci12: unexpected cc 0x0c03 length: 249 > 1 [ 995.320845][T28734] Bluetooth: hci12: unexpected cc 0x1003 length: 249 > 9 [ 995.328994][T28734] Bluetooth: hci12: unexpected cc 0x1001 length: 249 > 9 [ 995.351493][T28734] Bluetooth: hci12: unexpected cc 0x0c23 length: 249 > 4 [ 995.359085][T28734] Bluetooth: hci12: unexpected cc 0x0c25 length: 249 > 3 [ 995.366718][T28734] Bluetooth: hci12: unexpected cc 0x0c38 length: 249 > 2 21:15:39 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 995.849475][ T9] team0 (unregistering): Port device team_slave_1 removed 21:15:39 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 996.710144][ T9] team0 (unregistering): Port device team_slave_0 removed [ 996.967706][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:15:40 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 997.401473][T28734] Bluetooth: hci12: command 0x0409 tx timeout [ 997.571550][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:15:41 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:42 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:42 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:42 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x0, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 999.481134][T28734] Bluetooth: hci12: command 0x041b tx timeout [ 1000.124502][ T9] bond0 (unregistering): Released all slaves 21:15:43 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x0, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:44 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x0, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:44 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x0, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 1001.561159][T28734] Bluetooth: hci12: command 0x040f tx timeout 21:15:45 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x0, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:46 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x0, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 1003.641121][T28734] Bluetooth: hci12: command 0x0419 tx timeout 21:15:47 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0x0, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:47 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0x0, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:48 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0x0, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 1005.779474][ T9] team0 (unregistering): Port device team_slave_1 removed 21:15:49 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 1006.146848][ T9] team0 (unregistering): Port device team_slave_0 removed [ 1006.620736][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:15:50 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:51 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc, 0xb}, {0x4, 0x1, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 1007.681690][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:15:51 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:52 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:53 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 1010.562201][ T9] bond0 (unregistering): Released all slaves 21:15:54 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x0, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) 21:15:55 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x0, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 1012.521415][ T28] INFO: task dhcpcd:3215 blocked for more than 143 seconds. [ 1012.528907][ T28] Not tainted 6.1.75-syzkaller #0 [ 1012.551153][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1012.560118][ T28] task:dhcpcd state:D stack:24392 pid:3215 ppid:1 flags:0x00004002 21:15:55 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x0, 0xc, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 1012.581122][ T28] Call Trace: [ 1012.584427][ T28] [ 1012.587371][ T28] __schedule+0x142d/0x4550 [ 1012.611145][ T28] ? __mutex_lock+0x6b4/0xd80 [ 1012.615853][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1012.622378][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 1012.627875][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1012.633450][ T28] schedule+0xbf/0x180 [ 1012.637547][ T28] schedule_preempt_disabled+0xf/0x20 [ 1012.647419][ T28] __mutex_lock+0x6b9/0xd80 [ 1012.652191][ T28] ? __mutex_lock+0x53c/0xd80 [ 1012.656887][ T28] ? __netlink_dump_start+0x12e/0x6e0 [ 1012.662640][ T28] ? mutex_lock_nested+0x10/0x10 [ 1012.667597][ T28] ? netlink_lookup+0x31/0x200 [ 1012.673255][ T28] __netlink_dump_start+0x12e/0x6e0 [ 1012.678486][ T28] rtnetlink_rcv_msg+0xd4c/0xff0 [ 1012.683927][ T28] ? rtnetlink_rcv_msg+0x1f9/0xff0 [ 1012.689053][ T28] ? fib6_age+0x140/0x140 [ 1012.693942][ T28] ? rtnetlink_bind+0x80/0x80 [ 1012.698667][ T28] ? stack_trace_save+0x1c0/0x1c0 [ 1012.704063][ T28] ? kernel_text_address+0x9f/0xd0 [ 1012.709241][ T28] ? __kernel_text_address+0x9/0x40 [ 1012.715432][ T28] ? unwind_get_return_address+0x49/0x80 [ 1012.721325][ T28] ? arch_stack_walk+0xf3/0x140 [ 1012.726215][ T28] ? mark_lock+0x9a/0x340 [ 1012.730572][ T28] ? mark_lock+0x9a/0x340 [ 1012.735372][ T28] ? __lock_acquire+0x125b/0x1f80 [ 1012.740430][ T28] ? fib6_age+0x140/0x140 [ 1012.745135][ T28] netlink_rcv_skb+0x1cd/0x410 [ 1012.749912][ T28] ? rtnetlink_bind+0x80/0x80 [ 1012.755003][ T28] ? netlink_ack+0x1290/0x1290 [ 1012.759797][ T28] ? netlink_deliver_tap+0x2e/0x1b0 [ 1012.771150][ T28] netlink_unicast+0x7d8/0x970 [ 1012.779683][ T28] ? netlink_detachskb+0x90/0x90 [ 1012.791196][ T28] ? __virt_addr_valid+0x22b/0x2e0 [ 1012.796380][ T28] ? __phys_addr_symbol+0x2b/0x70 [ 1012.804652][ T28] ? __check_object_size+0x4dd/0xa30 [ 1012.809960][ T28] ? bpf_lsm_netlink_send+0x5/0x10 [ 1012.818536][ T28] netlink_sendmsg+0xa26/0xd60 [ 1012.824292][ T28] ? netlink_getsockopt+0x580/0x580 [ 1012.829514][ T28] ? aa_sock_msg_perm+0x91/0x150 [ 1012.839860][ T28] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1012.856052][ T28] ? security_socket_sendmsg+0x7d/0xa0 [ 1012.861841][ T28] ? netlink_getsockopt+0x580/0x580 [ 1012.867060][ T28] ____sys_sendmsg+0x5a5/0x8f0 [ 1012.872307][ T28] ? __sys_sendmsg_sock+0x30/0x30 [ 1012.877360][ T28] ? do_iter_read+0x98d/0xc70 [ 1012.882780][ T28] __sys_sendmsg+0x2a9/0x390 [ 1012.887395][ T28] ? ____sys_sendmsg+0x8f0/0x8f0 [ 1012.892715][ T28] ? vfs_write+0x923/0xba0 [ 1012.897185][ T28] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1012.903506][ T28] ? syscall_enter_from_user_mode+0xd4/0x220 [ 1012.909701][ T28] do_syscall_64+0x3d/0xb0 [ 1012.917978][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1012.926188][ T28] RIP: 0033:0x7f189dde6a4b 21:15:56 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0x0, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 1012.930644][ T28] RSP: 002b:00007fff998088d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1012.944840][ T28] RAX: ffffffffffffffda RBX: 00005571933ed77c RCX: 00007f189dde6a4b [ 1012.955434][ T28] RDX: 0000000000000000 RSI: 00007fff99808920 RDI: 000000000000000f [ 1012.970992][ T28] RBP: 00007fff9980d568 R08: 00007fff9980cb28 R09: 00007fff9980cb28 [ 1012.978987][ T28] R10: 000055719340b15e R11: 0000000000000246 R12: 000000000000000f [ 1012.987561][ T28] R13: 00007fff9980cb28 R14: 00007fff9980cb08 R15: 0000557193b89d88 [ 1013.001251][ T28] [ 1013.004381][ T28] INFO: task kworker/0:8:26964 blocked for more than 143 seconds. [ 1013.021072][ T28] Not tainted 6.1.75-syzkaller #0 [ 1013.026659][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1013.036190][ T28] task:kworker/0:8 state:D stack:26232 pid:26964 ppid:2 flags:0x00004000 [ 1013.050990][ T28] Workqueue: ipv6_addrconf addrconf_verify_work [ 1013.057317][ T28] Call Trace: [ 1013.060598][ T28] [ 1013.071004][ T28] __schedule+0x142d/0x4550 [ 1013.075607][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1013.082870][ T28] ? print_irqtrace_events+0x210/0x210 [ 1013.088405][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1013.101010][ T28] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1013.106262][ T28] ? lockdep_hardirqs_on+0x94/0x130 [ 1013.111779][ T28] schedule+0xbf/0x180 [ 1013.117323][ T28] schedule_preempt_disabled+0xf/0x20 [ 1013.151920][ T28] __mutex_lock+0x6b9/0xd80 [ 1013.156456][ T28] ? __mutex_lock+0x53c/0xd80 [ 1013.161542][ T28] ? addrconf_verify_work+0x15/0x30 [ 1013.166762][ T28] ? mutex_lock_nested+0x10/0x10 [ 1013.191129][ T28] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1013.197143][ T28] ? print_irqtrace_events+0x210/0x210 [ 1013.211013][ T28] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1013.216937][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1013.241380][ T28] ? process_one_work+0x7a9/0x11d0 [ 1013.246517][ T28] addrconf_verify_work+0x15/0x30 [ 1013.265145][ T28] process_one_work+0x8a9/0x11d0 [ 1013.270122][ T28] ? worker_detach_from_pool+0x260/0x260 [ 1013.276134][ T28] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1013.281974][ T28] ? kthread_data+0x4e/0xc0 [ 1013.286511][ T28] ? wq_worker_running+0x97/0x190 [ 1013.292192][ T28] worker_thread+0xa47/0x1200 [ 1013.296895][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1013.303209][ T28] kthread+0x28d/0x320 [ 1013.307295][ T28] ? worker_clr_flags+0x190/0x190 [ 1013.312705][ T28] ? kthread_blkcg+0xd0/0xd0 [ 1013.317324][ T28] ret_from_fork+0x1f/0x30 [ 1013.322259][ T28] [ 1013.326094][ T28] INFO: task kworker/1:19:28834 blocked for more than 144 seconds. [ 1013.334330][ T28] Not tainted 6.1.75-syzkaller #0 [ 1013.339886][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1013.348879][ T28] task:kworker/1:19 state:D stack:26328 pid:28834 ppid:2 flags:0x00004000 [ 1013.358310][ T28] Workqueue: events linkwatch_event [ 1013.363789][ T28] Call Trace: [ 1013.367085][ T28] [ 1013.370029][ T28] __schedule+0x142d/0x4550 [ 1013.375599][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1013.381765][ T28] ? print_irqtrace_events+0x210/0x210 [ 1013.387249][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1013.393077][ T28] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1013.398296][ T28] ? lockdep_hardirqs_on+0x94/0x130 [ 1013.404093][ T28] schedule+0xbf/0x180 [ 1013.408191][ T28] schedule_preempt_disabled+0xf/0x20 [ 1013.414199][ T28] __mutex_lock+0x6b9/0xd80 [ 1013.418774][ T28] ? __mutex_lock+0x53c/0xd80 [ 1013.423816][ T28] ? linkwatch_event+0xa/0x50 [ 1013.428597][ T28] ? mutex_lock_nested+0x10/0x10 [ 1013.433877][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1013.439106][ T28] ? process_one_work+0x7a9/0x11d0 [ 1013.444612][ T28] linkwatch_event+0xa/0x50 [ 1013.449131][ T28] process_one_work+0x8a9/0x11d0 [ 1013.454419][ T28] ? worker_detach_from_pool+0x260/0x260 [ 1013.460081][ T28] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1013.470993][ T28] ? kthread_data+0x4e/0xc0 [ 1013.475532][ T28] ? wq_worker_running+0x97/0x190 [ 1013.480569][ T28] worker_thread+0xa47/0x1200 [ 1013.491032][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1013.501249][ T28] kthread+0x28d/0x320 [ 1013.505345][ T28] ? worker_clr_flags+0x190/0x190 [ 1013.510372][ T28] ? kthread_blkcg+0xd0/0xd0 [ 1013.521049][ T28] ret_from_fork+0x1f/0x30 [ 1013.525759][ T28] [ 1013.528797][ T28] INFO: task kworker/1:20:28835 blocked for more than 144 seconds. [ 1013.544435][ T28] Not tainted 6.1.75-syzkaller #0 [ 1013.550075][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1013.571058][ T28] task:kworker/1:20 state:D stack:27368 pid:28835 ppid:2 flags:0x00004000 [ 1013.580299][ T28] Workqueue: events switchdev_deferred_process_work [ 1013.587363][ T28] Call Trace: [ 1013.590652][ T28] [ 1013.601320][ T28] __schedule+0x142d/0x4550 [ 1013.605880][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1013.619498][ T28] ? print_irqtrace_events+0x210/0x210 [ 1013.625291][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1013.630505][ T28] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1013.641251][ T28] ? lockdep_hardirqs_on+0x94/0x130 [ 1013.646510][ T28] schedule+0xbf/0x180 [ 1013.650593][ T28] schedule_preempt_disabled+0xf/0x20 [ 1013.661202][ T28] __mutex_lock+0x6b9/0xd80 [ 1013.665739][ T28] ? __mutex_lock+0x53c/0xd80 [ 1013.670434][ T28] ? switchdev_deferred_process_work+0xa/0x20 [ 1013.681137][ T28] ? mutex_lock_nested+0x10/0x10 [ 1013.686102][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1013.697140][ T28] ? process_one_work+0x7a9/0x11d0 [ 1013.703262][ T28] switchdev_deferred_process_work+0xa/0x20 [ 1013.709177][ T28] process_one_work+0x8a9/0x11d0 [ 1013.721281][ T28] ? worker_detach_from_pool+0x260/0x260 [ 1013.727057][ T28] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1013.741278][ T28] ? kthread_data+0x4e/0xc0 [ 1013.745814][ T28] ? wq_worker_running+0x97/0x190 [ 1013.750864][ T28] worker_thread+0xa47/0x1200 [ 1013.755945][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1013.771043][ T28] kthread+0x28d/0x320 [ 1013.775269][ T28] ? worker_clr_flags+0x190/0x190 [ 1013.780306][ T28] ? kthread_blkcg+0xd0/0xd0 [ 1013.785426][ T28] ret_from_fork+0x1f/0x30 [ 1013.789879][ T28] [ 1013.811741][ T28] INFO: task syz-executor.3:29063 blocked for more than 144 seconds. [ 1013.819825][ T28] Not tainted 6.1.75-syzkaller #0 [ 1013.851046][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1013.859963][ T28] task:syz-executor.3 state:D stack:21736 pid:29063 ppid:1 flags:0x00004006 [ 1013.881018][ T28] Call Trace: [ 1013.884370][ T28] [ 1013.887317][ T28] __schedule+0x142d/0x4550 [ 1013.911111][ T28] ? __mutex_lock+0x6b4/0xd80 [ 1013.915819][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1013.928615][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 1013.941104][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1013.946330][ T28] schedule+0xbf/0x180 [ 1013.950540][ T28] schedule_preempt_disabled+0xf/0x20 [ 1013.971034][ T28] __mutex_lock+0x6b9/0xd80 [ 1013.975567][ T28] ? __mutex_lock+0x53c/0xd80 [ 1013.980332][ T28] ? rtnetlink_rcv_msg+0x7c1/0xff0 [ 1014.001065][ T28] ? mutex_lock_nested+0x10/0x10 [ 1014.006300][ T28] ? rtnetlink_rcv_msg+0x1f9/0xff0 [ 1014.033310][ T28] rtnetlink_rcv_msg+0x7c1/0xff0 [ 1014.038288][ T28] ? rtnetlink_bind+0x80/0x80 [ 1014.054391][ T28] ? stack_trace_save+0x1c0/0x1c0 [ 1014.059448][ T28] ? kernel_text_address+0x9f/0xd0 [ 1014.074867][ T28] ? __kernel_text_address+0x9/0x40 [ 1014.080097][ T28] ? unwind_get_return_address+0x49/0x80 [ 1014.091034][ T28] ? arch_stack_walk+0xf3/0x140 [ 1014.099334][ T28] ? mark_lock+0x9a/0x340 [ 1014.104952][ T28] ? mark_lock+0x9a/0x340 [ 1014.110671][ T28] ? __lock_acquire+0x125b/0x1f80 [ 1014.121282][ T28] netlink_rcv_skb+0x1cd/0x410 [ 1014.131002][ T28] ? rtnetlink_bind+0x80/0x80 [ 1014.135706][ T28] ? netlink_ack+0x1290/0x1290 [ 1014.140495][ T28] ? netlink_deliver_tap+0x2e/0x1b0 [ 1014.171250][ T28] netlink_unicast+0x7d8/0x970 [ 1014.176045][ T28] ? netlink_detachskb+0x90/0x90 [ 1014.190984][ T28] ? __virt_addr_valid+0x22b/0x2e0 [ 1014.196124][ T28] ? __phys_addr_symbol+0x2b/0x70 [ 1014.210989][ T28] ? __check_object_size+0x4dd/0xa30 [ 1014.216300][ T28] ? bpf_lsm_netlink_send+0x5/0x10 [ 1014.231153][ T28] netlink_sendmsg+0xa26/0xd60 [ 1014.235956][ T28] ? netlink_getsockopt+0x580/0x580 [ 1014.251017][ T28] ? __might_fault+0xa1/0x110 [ 1014.255798][ T28] ? aa_sock_msg_perm+0x91/0x150 [ 1014.260757][ T28] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1014.281217][ T28] ? security_socket_sendmsg+0x7d/0xa0 [ 1014.286710][ T28] ? netlink_getsockopt+0x580/0x580 [ 1014.292070][ T28] __sys_sendto+0x480/0x600 21:15:57 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0x0, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 1014.296601][ T28] ? __ia32_sys_getpeername+0x80/0x80 [ 1014.311036][ T28] ? print_irqtrace_events+0x210/0x210 [ 1014.316536][ T28] __x64_sys_sendto+0xda/0xf0 [ 1014.321324][ T28] do_syscall_64+0x3d/0xb0 [ 1014.325762][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1014.341049][ T28] RIP: 0033:0x7f7559c7ea9c [ 1014.345969][ T28] RSP: 002b:00007ffe41afd8c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1014.354465][ T28] RAX: ffffffffffffffda RBX: 00007f755a8d4620 RCX: 00007f7559c7ea9c [ 1014.387224][ T28] RDX: 0000000000000028 RSI: 00007f755a8d4670 RDI: 0000000000000003 [ 1014.401047][ T28] RBP: 0000000000000000 R08: 00007ffe41afd914 R09: 000000000000000c [ 1014.409071][ T28] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1014.417304][ T28] R13: 0000000000000000 R14: 00007f755a8d4670 R15: 0000000000000000 [ 1014.431040][ T28] [ 1014.434612][ T28] INFO: task syz-executor.4:29088 blocked for more than 145 seconds. [ 1014.451034][ T28] Not tainted 6.1.75-syzkaller #0 [ 1014.456594][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1014.465325][ T28] task:syz-executor.4 state:D stack:21736 pid:29088 ppid:1 flags:0x00004006 [ 1014.481072][ T28] Call Trace: [ 1014.484368][ T28] [ 1014.487313][ T28] __schedule+0x142d/0x4550 [ 1014.491939][ T28] ? __mutex_lock+0x6b4/0xd80 [ 1014.496634][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1014.511046][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 1014.516544][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1014.531038][ T28] schedule+0xbf/0x180 [ 1014.535140][ T28] schedule_preempt_disabled+0xf/0x20 [ 1014.540522][ T28] __mutex_lock+0x6b9/0xd80 [ 1014.545100][ T28] ? __mutex_lock+0x53c/0xd80 [ 1014.549788][ T28] ? rtnetlink_rcv_msg+0x7c1/0xff0 [ 1014.561009][ T28] ? mutex_lock_nested+0x10/0x10 [ 1014.565979][ T28] ? rtnetlink_rcv_msg+0x1f9/0xff0 [ 1014.581023][ T28] rtnetlink_rcv_msg+0x7c1/0xff0 [ 1014.585994][ T28] ? rtnetlink_bind+0x80/0x80 [ 1014.590682][ T28] ? stack_trace_save+0x1c0/0x1c0 [ 1014.608796][ T28] ? kernel_text_address+0x9f/0xd0 [ 1014.621030][ T28] ? __kernel_text_address+0x9/0x40 [ 1014.626255][ T28] ? unwind_get_return_address+0x49/0x80 [ 1014.641010][ T28] ? arch_stack_walk+0xf3/0x140 [ 1014.645890][ T28] ? mark_lock+0x9a/0x340 [ 1014.650244][ T28] ? mark_lock+0x9a/0x340 [ 1014.661025][ T28] ? __lock_acquire+0x125b/0x1f80 [ 1014.666113][ T28] netlink_rcv_skb+0x1cd/0x410 [ 1014.670888][ T28] ? rtnetlink_bind+0x80/0x80 [ 1014.685055][ T28] ? netlink_ack+0x1290/0x1290 [ 1014.689886][ T28] ? netlink_deliver_tap+0x2e/0x1b0 [ 1014.701013][ T28] netlink_unicast+0x7d8/0x970 [ 1014.705819][ T28] ? netlink_detachskb+0x90/0x90 [ 1014.710773][ T28] ? __virt_addr_valid+0x22b/0x2e0 [ 1014.731074][ T28] ? __phys_addr_symbol+0x2b/0x70 [ 1014.736126][ T28] ? __check_object_size+0x4dd/0xa30 [ 1014.741478][ T28] ? bpf_lsm_netlink_send+0x5/0x10 [ 1014.746607][ T28] netlink_sendmsg+0xa26/0xd60 [ 1014.761194][ T28] ? netlink_getsockopt+0x580/0x580 [ 1014.766416][ T28] ? __might_fault+0xa1/0x110 [ 1014.771189][ T28] ? aa_sock_msg_perm+0x91/0x150 [ 1014.776145][ T28] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1014.781591][ T28] ? security_socket_sendmsg+0x7d/0xa0 [ 1014.787068][ T28] ? netlink_getsockopt+0x580/0x580 [ 1014.811034][ T28] __sys_sendto+0x480/0x600 [ 1014.815577][ T28] ? __ia32_sys_getpeername+0x80/0x80 [ 1014.821054][ T28] ? print_irqtrace_events+0x210/0x210 [ 1014.826548][ T28] __x64_sys_sendto+0xda/0xf0 [ 1014.841151][ T28] do_syscall_64+0x3d/0xb0 [ 1014.845604][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1014.853828][ T28] RIP: 0033:0x7fe7dea7ea9c [ 1014.858262][ T28] RSP: 002b:00007ffda4afbb40 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1014.866738][ T28] RAX: ffffffffffffffda RBX: 00007fe7df6d4620 RCX: 00007fe7dea7ea9c [ 1014.887049][ T28] RDX: 0000000000000028 RSI: 00007fe7df6d4670 RDI: 0000000000000003 [ 1014.899557][ T28] RBP: 0000000000000000 R08: 00007ffda4afbb94 R09: 000000000000000c [ 1014.907618][ T28] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1014.925722][ T28] R13: 0000000000000000 R14: 00007fe7df6d4670 R15: 0000000000000000 [ 1014.938288][ T28] [ 1014.941381][ T28] INFO: task syz-executor.2:29094 blocked for more than 145 seconds. [ 1014.949447][ T28] Not tainted 6.1.75-syzkaller #0 [ 1014.965102][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1014.979430][ T28] task:syz-executor.2 state:D stack:21736 pid:29094 ppid:1 flags:0x00004006 [ 1014.988702][ T28] Call Trace: [ 1014.998693][ T28] [ 1015.004040][ T28] __schedule+0x142d/0x4550 [ 1015.008594][ T28] ? __mutex_lock+0x6b4/0xd80 [ 1015.018969][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1015.024951][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 1015.030439][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1015.045732][ T28] schedule+0xbf/0x180 [ 1015.049835][ T28] schedule_preempt_disabled+0xf/0x20 [ 1015.064251][ T28] __mutex_lock+0x6b9/0xd80 [ 1015.068789][ T28] ? __mutex_lock+0x53c/0xd80 [ 1015.073533][ T28] ? rtnetlink_rcv_msg+0x7c1/0xff0 [ 1015.078656][ T28] ? mutex_lock_nested+0x10/0x10 [ 1015.094797][ T28] ? rtnetlink_rcv_msg+0x1f9/0xff0 [ 1015.099931][ T28] rtnetlink_rcv_msg+0x7c1/0xff0 [ 1015.104930][ T28] ? rtnetlink_bind+0x80/0x80 [ 1015.109618][ T28] ? stack_trace_save+0x1c0/0x1c0 [ 1015.126887][ T28] ? kernel_text_address+0x9f/0xd0 [ 1015.132076][ T28] ? __kernel_text_address+0x9/0x40 [ 1015.137291][ T28] ? unwind_get_return_address+0x49/0x80 [ 1015.156374][ T28] ? arch_stack_walk+0xf3/0x140 [ 1015.165155][ T28] ? mark_lock+0x9a/0x340 [ 1015.169551][ T28] ? mark_lock+0x9a/0x340 [ 1015.181753][ T28] ? __lock_acquire+0x125b/0x1f80 [ 1015.186835][ T28] netlink_rcv_skb+0x1cd/0x410 [ 1015.191667][ T28] ? rtnetlink_bind+0x80/0x80 [ 1015.196354][ T28] ? netlink_ack+0x1290/0x1290 [ 1015.201168][ T28] ? netlink_deliver_tap+0x2e/0x1b0 [ 1015.206379][ T28] netlink_unicast+0x7d8/0x970 [ 1015.231067][ T28] ? netlink_detachskb+0x90/0x90 [ 1015.236053][ T28] ? __virt_addr_valid+0x22b/0x2e0 [ 1015.249172][ T28] ? __phys_addr_symbol+0x2b/0x70 [ 1015.254275][ T28] ? __check_object_size+0x4dd/0xa30 [ 1015.259572][ T28] ? bpf_lsm_netlink_send+0x5/0x10 [ 1015.264745][ T28] netlink_sendmsg+0xa26/0xd60 [ 1015.269530][ T28] ? netlink_getsockopt+0x580/0x580 [ 1015.292559][ T28] ? __might_fault+0xa1/0x110 [ 1015.297279][ T28] ? aa_sock_msg_perm+0x91/0x150 [ 1015.302278][ T28] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1015.307574][ T28] ? security_socket_sendmsg+0x7d/0xa0 [ 1015.327560][ T28] ? netlink_getsockopt+0x580/0x580 [ 1015.337311][ T28] __sys_sendto+0x480/0x600 [ 1015.341884][ T28] ? __ia32_sys_getpeername+0x80/0x80 [ 1015.347300][ T28] ? print_irqtrace_events+0x210/0x210 [ 1015.352832][ T28] __x64_sys_sendto+0xda/0xf0 [ 1015.357529][ T28] do_syscall_64+0x3d/0xb0 [ 1015.379745][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1015.385741][ T28] RIP: 0033:0x7f9282c7ea9c [ 1015.390165][ T28] RSP: 002b:00007ffe41d6b700 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1015.412313][ T28] RAX: ffffffffffffffda RBX: 00007f92838d4620 RCX: 00007f9282c7ea9c [ 1015.426984][ T28] RDX: 0000000000000028 RSI: 00007f92838d4670 RDI: 0000000000000003 [ 1015.435035][ T28] RBP: 0000000000000000 R08: 00007ffe41d6b754 R09: 000000000000000c 21:15:58 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0x0, 0xb}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 1015.443065][ T28] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1015.481762][ T28] R13: 0000000000000000 R14: 00007f92838d4670 R15: 0000000000000000 [ 1015.489773][ T28] [ 1015.501265][ T28] INFO: task syz-executor.0:29288 blocked for more than 146 seconds. [ 1015.509345][ T28] Not tainted 6.1.75-syzkaller #0 [ 1015.514951][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1015.540992][ T28] task:syz-executor.0 state:D stack:25288 pid:29288 ppid:1 flags:0x00004006 [ 1015.550227][ T28] Call Trace: [ 1015.553565][ T28] [ 1015.556505][ T28] __schedule+0x142d/0x4550 [ 1015.571029][ T28] ? __mutex_lock+0x6b4/0xd80 [ 1015.575734][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1015.581843][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 1015.587328][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1015.601002][ T28] schedule+0xbf/0x180 [ 1015.605102][ T28] schedule_preempt_disabled+0xf/0x20 [ 1015.610486][ T28] __mutex_lock+0x6b9/0xd80 [ 1015.631011][ T28] ? __mutex_lock+0x53c/0xd80 [ 1015.635720][ T28] ? register_nexthop_notifier+0x80/0x270 [ 1015.649356][ T28] ? mutex_lock_nested+0x10/0x10 [ 1015.661027][ T28] ? memset+0x1f/0x40 [ 1015.665103][ T28] register_nexthop_notifier+0x80/0x270 [ 1015.670660][ T28] ? lockdep_softirqs_off+0x420/0x420 [ 1015.681000][ T28] ? fib_check_nexthop+0x570/0x570 [ 1015.686145][ T28] ? memset+0x1f/0x40 [ 1015.690138][ T28] ops_init+0x356/0x600 [ 1015.701002][ T28] setup_net+0x4b5/0xb90 [ 1015.705277][ T28] ? copy_net_ns+0x5d0/0x5d0 [ 1015.709888][ T28] copy_net_ns+0x395/0x5d0 [ 1015.721321][ T28] create_new_namespaces+0x425/0x7a0 [ 1015.727906][ T28] ? bpf_lsm_capable+0x5/0x10 [ 1015.733024][ T28] unshare_nsproxy_namespaces+0x11e/0x170 [ 1015.738769][ T28] ksys_unshare+0x580/0xb20 [ 1015.751017][ T28] ? unshare_fd+0x240/0x240 [ 1015.755552][ T28] ? syscall_enter_from_user_mode+0x2e/0x220 [ 1015.771014][ T28] ? lockdep_hardirqs_on+0x94/0x130 [ 1015.776243][ T28] __x64_sys_unshare+0x34/0x40 [ 1015.781206][ T28] do_syscall_64+0x3d/0xb0 [ 1015.785646][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1015.800993][ T28] RIP: 0033:0x7ffa1847e507 [ 1015.805432][ T28] RSP: 002b:00007ffdbda03b18 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 1015.814062][ T28] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007ffa1847e507 [ 1015.831104][ T28] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 1015.839100][ T28] RBP: 00007ffdbda03bf0 R08: 0000000000000000 R09: 0000000000000000 [ 1015.853711][ T28] R10: 0000000000000000 R11: 0000000000000206 R12: 00007ffdbda041d8 [ 1015.871008][ T28] R13: 0000000000000003 R14: 00007ffa185ac9d8 R15: 000000000000000c [ 1015.879019][ T28] [ 1015.891024][ T28] [ 1015.891024][ T28] Showing all locks held in the system: [ 1015.898749][ T28] 5 locks held by kworker/u4:0/9: [ 1015.911011][ T28] #0: ffff888012616938 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1015.921525][ T28] #1: ffffc900000e7d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1015.941075][ T28] #2: ffffffff8e289710 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1015.950432][ T28] #3: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0xd7/0x630 [ 1015.970988][ T28] #4: ffffffff8d12f8b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x3b0/0x8a0 [ 1015.991001][ T28] 1 lock held by rcu_tasks_kthre/12: [ 1015.996304][ T28] #0: ffffffff8d12a490 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x29/0xe30 [ 1016.021044][ T28] 1 lock held by rcu_tasks_trace/13: [ 1016.026346][ T28] #0: ffffffff8d12ac90 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x29/0xe30 [ 1016.051045][ T28] 1 lock held by khungtaskd/28: [ 1016.055914][ T28] #0: ffffffff8d12a2c0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x51/0x290 [ 1016.081063][ T28] 1 lock held by dhcpcd/3215: [ 1016.085754][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: __netlink_dump_start+0x12e/0x6e0 [ 1016.111014][ T28] 2 locks held by getty/3303: [ 1016.115706][ T28] #0: ffff88814b942098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1016.126008][ T28] #1: ffffc900031262f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6a7/0x1db0 [ 1016.150432][ T28] 2 locks held by kworker/u4:5/3646: [ 1016.155907][ T28] 3 locks held by kworker/0:8/26964: [ 1016.161458][ T28] #0: ffff88814b8b9d38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1016.182752][ T28] #1: ffffc9000321fd20 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1016.210993][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x15/0x30 [ 1016.220519][ T28] 2 locks held by kworker/0:9/26965: [ 1016.230993][ T28] #0: ffff888012472538 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1016.251035][ T28] #1: ffffc900039efd20 ((work_completion)(&rew->rew_work)){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1016.262640][ T28] 3 locks held by kworker/1:19/28834: [ 1016.268022][ T28] #0: ffff888012470d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1016.291030][ T28] #1: ffffc9000392fd20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1016.311003][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1016.320039][ T28] 3 locks held by kworker/1:20/28835: [ 1016.325616][ T28] #0: ffff888012470d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1016.350994][ T28] #1: ffffc9000394fd20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1016.361544][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1016.381052][ T28] 3 locks held by kworker/1:22/28837: [ 1016.386439][ T28] #0: ffff88814b8b9d38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1016.411004][ T28] #1: ffffc9000396fd20 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1016.430991][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x15/0x30 [ 1016.440519][ T28] 1 lock held by syz-executor.3/29063: [ 1016.456561][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1016.470990][ T28] 1 lock held by syz-executor.4/29088: [ 1016.476461][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1016.501005][ T28] 1 lock held by syz-executor.2/29094: [ 1016.506517][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1016.521076][ T28] 2 locks held by syz-executor.0/29288: [ 1016.526708][ T28] #0: ffffffff8e289710 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x37b/0x5d0 [ 1016.541010][ T28] #1: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: register_nexthop_notifier+0x80/0x270 [ 1016.561015][ T28] 1 lock held by syz-executor.3/29717: [ 1016.566491][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1016.581014][ T28] 1 lock held by syz-executor.4/29748: [ 1016.586485][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1016.610992][ T28] 1 lock held by syz-executor.2/29750: [ 1016.616465][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1016.630995][ T28] 1 lock held by syz-executor.0/29841: [ 1016.636469][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1016.651014][ T28] 1 lock held by syz-executor.3/30112: [ 1016.656485][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 21:16:00 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000880)="87", &(0x7f0000000940)='L'}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8da7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x41000, 0x40, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x26ade, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600)=[{0x1, 0x4}, {0x1, 0x6}, {0x0, 0x0, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x3, 0x9}, {0x4, 0x3, 0x10, 0x9}], 0x10, 0x8}, 0x90) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000780)="a0de72669a232abebbf92e4a955d02cd37af2441fb28bab828b223dd7224cff87983bd21cb0e3d1ec169934b8dba09c22631f932ef06427650730373d33c2b16265ebc0aa9379b7e8c1fd6d8279d87f5477aef30f93a2f256875f8ae8fa4bd377d12948cb1236c5bdd3c3cacf7f27340c703e18583b51e9818d603972579357edbe1bc5e575d9df90ad2b2660fc340b82d63", 0x92}], 0x1, &(0x7f0000000880)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x78f}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x11}}, {@rand_addr=0x64010100, 0xfffffffc}, {@private=0xa010100, 0x5}]}, @lsrr={0x83, 0x23, 0x3e, [@remote, @loopback, @broadcast, @private=0xa010102, @empty, @private=0xa010101, @broadcast, @multicast2]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@cipso={0x86, 0x2f, 0xffffffffffffffff, [{0x7, 0xe, "131e02ffcbaf4c554187eca7"}, {0x7, 0xb, "d6d3f57714c2521f05"}, {0x2, 0xe, "1736dacc4759d2cd2face551"}, {0x2, 0x2}]}, @generic={0x0, 0x2}, @end, @rr={0x7, 0x13, 0x8a, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, @remote]}, @timestamp_prespec={0x44, 0x14, 0x86, 0x3, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@rand_addr=0x64010100, 0xffffffff}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14}}, @ip_ttl={{0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x160}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x8, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[r0, r0, r2, 0xffffffffffffffff]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000d80)={r2, r4, 0x4}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7ff, '\x00', r1, r2, 0x3, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@bloom_filter={0x1e, 0x6a8, 0x9, 0x1f, 0x531, 0x1, 0x232, '\x00', r1, r2, 0x3, 0x3, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xc, 0x9, 0x4, 0x100, 0x1089, 0xffffffffffffffff, 0x7, '\x00', r1, r2, 0x1, 0x2, 0x2}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000ec0)=@o_path={&(0x7f0000000e80)='./file0\x00', r3, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu={0x4, 0x0, 0xc, 0x0, 0x7, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xff, 0xdd, &(0x7f0000000080)=""/221, 0x0, 0x3, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x3, 0xd, 0x3ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x1, 0x2, 0x4}, {0x3, 0x4, 0x4, 0x9}, {0x4, 0x3, 0x5, 0xc}, {0x0, 0x5, 0xc}, {0x4, 0x1, 0xa, 0xa}, {0x3, 0x3, 0x9, 0xa}], 0x10, 0x5}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = syz_clone(0x8001000, &(0x7f0000000580)="b06e781d90679f2bc9f48a5ab5a05f989bd153bdfaad1fbe2274e4afafa7fc42ecc59e10a934f31ecc9f2859ae0365dd773986505c7166c9b56b5b91a68df9d16093a01941f76a", 0x47, &(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000d80)="4eccbbf2d6c499fc1555a3250caa287a19d40f4638ba05add357d4325b56351389a61148f93f338a91f8c1495e0e1f28071c9c4c38be1913b962717f13980b29c5dfdb2d2fb54d834c8c4ceb11df65ab6a267bf79db854e0e8f40aa2b675a70c24dd8c0f6801a18c16656eaf360cc815de1781103d186f5cdf8fcc98b62b956e4498b4350e359382fe64dd2cfb245354998a823de41fa3ac7502a0631569e55f5ec89ab31b67d056caad3b29ec2e038605e0ea3139b250ca7faae8a2f6924c8f54aa614312fce1584113df295e24e34a38a71a83f4665e2f055d3199d0eaea413824") write$cgroup_pid(r6, &(0x7f00000007c0)=r8, 0x12) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0xdc1, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0x0, '\x00', r7, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, &(0x7f00000005c0), &(0x7f0000000600)=[{0x1, 0x0, 0x0, 0x7}, {0x1, 0x2}, {0x0, 0x1, 0xf}, {0x5, 0x5, 0x7}, {0x3, 0x1, 0x6, 0x9}, {0x0, 0x3}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8dc}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b40)='syzkaller\x00', 0xffffff01, 0x28, &(0x7f0000000b80)=""/40, 0x1f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[r6, r6, r9, r6], &(0x7f0000000c80)=[{0x4, 0x3, 0x0, 0x5}, {0x4, 0x8, 0xa}]}, 0x90) [ 1016.688553][ T28] 1 lock held by syz-executor.4/30141: [ 1016.694186][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1016.711061][ T28] 1 lock held by syz-executor.2/30143: [ 1016.716535][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1016.741584][ T28] 1 lock held by syz-executor.0/30237: [ 1016.747060][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1016.770997][ T28] 2 locks held by syz-executor.1/30251: [ 1016.776559][ T28] 3 locks held by syz-executor.1/30255: [ 1016.782339][ T28] 2 locks held by syz-executor.1/30259: [ 1016.787895][ T28] 3 locks held by syz-executor.1/30262: [ 1016.801006][ T28] 3 locks held by syz-executor.1/30266: [ 1016.806566][ T28] 2 locks held by syz-executor.1/30270: [ 1016.821073][ T28] 2 locks held by syz-executor.1/30273: [ 1016.826634][ T28] 4 locks held by syz-executor.1/30277: [ 1016.841003][ T28] 2 locks held by syz-executor.1/30286: [ 1016.846564][ T28] 3 locks held by syz-executor.1/30290: [ 1016.852308][ T28] 2 locks held by syz-executor.1/30294: [ 1016.857863][ T28] 2 locks held by syz-executor.1/30298: [ 1016.870994][ T28] 2 locks held by syz-executor.1/30302: [ 1016.876555][ T28] 3 locks held by syz-executor.1/30306: [ 1016.890995][ T28] 2 locks held by syz-executor.1/30310: [ 1016.896556][ T28] 2 locks held by syz-executor.1/30318: [ 1016.902326][ T28] 3 locks held by syz-executor.1/30322: [ 1016.907880][ T28] 4 locks held by syz-executor.1/30326: [ 1016.921104][ T28] 2 locks held by syz-executor.1/30332: [ 1016.926667][ T28] 2 locks held by syz-executor.1/30336: [ 1016.941099][ T28] 4 locks held by syz-executor.1/30340: [ 1016.946657][ T28] 2 locks held by syz-executor.1/30345: [ 1016.961008][ T28] 2 locks held by syz-executor.1/30348: [ 1016.969814][ T28] [ 1016.972360][ T28] ============================================= [ 1016.972360][ T28] [ 1016.980773][ T28] NMI backtrace for cpu 0 [ 1016.985099][ T28] CPU: 0 PID: 28 Comm: khungtaskd Not tainted 6.1.75-syzkaller #0 [ 1016.992906][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1017.002964][ T28] Call Trace: [ 1017.006247][ T28] [ 1017.009181][ T28] dump_stack_lvl+0x1e3/0x2cb [ 1017.013875][ T28] ? nf_tcp_handle_invalid+0x642/0x642 [ 1017.019343][ T28] ? panic+0x75d/0x75d [ 1017.023414][ T28] ? vprintk_emit+0x622/0x740 [ 1017.028123][ T28] ? printk_sprint+0x490/0x490 [ 1017.032895][ T28] ? nmi_cpu_backtrace+0x252/0x560 [ 1017.038016][ T28] nmi_cpu_backtrace+0x4e1/0x560 [ 1017.042967][ T28] ? nmi_trigger_cpumask_backtrace+0x3f0/0x3f0 [ 1017.049127][ T28] ? _printk+0xd1/0x111 [ 1017.053287][ T28] ? panic+0x75d/0x75d [ 1017.057367][ T28] ? __wake_up_klogd+0xcc/0x100 [ 1017.062229][ T28] ? panic+0x75d/0x75d [ 1017.066288][ T28] ? nmi_trigger_cpumask_backtrace+0xe2/0x3f0 [ 1017.072354][ T28] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1017.078465][ T28] nmi_trigger_cpumask_backtrace+0x1b0/0x3f0 [ 1017.084441][ T28] watchdog+0xf88/0xfd0 [ 1017.088619][ T28] ? watchdog+0x1f8/0xfd0 [ 1017.092939][ T28] kthread+0x28d/0x320 [ 1017.096997][ T28] ? hungtask_pm_notify+0x50/0x50 [ 1017.102010][ T28] ? kthread_blkcg+0xd0/0xd0 [ 1017.106592][ T28] ret_from_fork+0x1f/0x30 [ 1017.111009][ T28] [ 1017.114302][ T28] Sending NMI from CPU 0 to CPUs 1: [ 1017.119515][ C1] NMI backtrace for cpu 1 [ 1017.119524][ C1] CPU: 1 PID: 24817 Comm: kworker/u4:7 Not tainted 6.1.75-syzkaller #0 [ 1017.119539][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1017.119548][ C1] Workqueue: ext4-rsv-conversion ext4_end_io_rsv_work [ 1017.119629][ C1] RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x30/0x80 [ 1017.119651][ C1] Code: 8b 15 b4 f8 77 7e 65 8b 05 b5 f8 77 7e a9 00 01 ff 00 74 10 a9 00 01 00 00 74 5b 83 ba 1c 16 00 00 00 74 52 8b 82 f8 15 00 00 <83> f8 03 75 47 48 8b 8a 00 16 00 00 44 8b 8a fc 15 00 00 49 c1 e1 [ 1017.119664][ C1] RSP: 0018:ffffc90005d17798 EFLAGS: 00000046 [ 1017.119676][ C1] RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffff888076ff3b80 [ 1017.119686][ C1] RDX: ffff888076ff3b80 RSI: 0000000000000001 RDI: 0000000000000000 [ 1017.119695][ C1] RBP: 0000000000000001 R08: ffffffff8a86d907 R09: ffffc90005d17860 [ 1017.119705][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90005d17840 [ 1017.119715][ C1] R13: ffff888052d3de42 R14: ffffc90005d17858 R15: 1ffff92000ba2f0b [ 1017.119727][ C1] FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 1017.119739][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1017.119749][ C1] CR2: 00007f6de5ed56c6 CR3: 000000000ce8e000 CR4: 00000000003506e0 [ 1017.119762][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1017.119770][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1017.119780][ C1] Call Trace: [ 1017.119784][ C1] [ 1017.119789][ C1] ? nmi_cpu_backtrace+0x3de/0x560 [ 1017.119811][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1017.119833][ C1] ? nmi_trigger_cpumask_backtrace+0x3f0/0x3f0 [ 1017.119855][ C1] ? nmi_handle+0x25/0x440 [ 1017.119917][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1017.119938][ C1] ? nmi_handle+0x12e/0x440 [ 1017.119959][ C1] ? nmi_handle+0x25/0x440 [ 1017.119980][ C1] ? __sanitizer_cov_trace_const_cmp4+0x30/0x80 [ 1017.119998][ C1] ? default_do_nmi+0x62/0x150 [ 1017.120012][ C1] ? exc_nmi+0xab/0x120 [ 1017.120025][ C1] ? end_repeat_nmi+0x16/0x31 [ 1017.120048][ C1] ? xas_start+0x227/0x7b0 [ 1017.120066][ C1] ? __sanitizer_cov_trace_const_cmp4+0x30/0x80 [ 1017.120085][ C1] ? __sanitizer_cov_trace_const_cmp4+0x30/0x80 [ 1017.120104][ C1] ? __sanitizer_cov_trace_const_cmp4+0x30/0x80 [ 1017.120123][ C1] [ 1017.120127][ C1] [ 1017.120131][ C1] xas_start+0x227/0x7b0 [ 1017.120151][ C1] __xa_clear_mark+0x149/0x2f0 [ 1017.120171][ C1] ? _raw_spin_lock_irqsave+0xac/0x120 [ 1017.120190][ C1] ? __xa_set_mark+0x2f0/0x2f0 [ 1017.120214][ C1] ? folio_index+0xab/0x350 [ 1017.120249][ C1] __folio_end_writeback+0x28e/0xda0 [ 1017.120273][ C1] ? __folio_cancel_dirty+0x5a0/0x5a0 [ 1017.120305][ C1] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 1017.120322][ C1] ? lockdep_hardirqs_on+0x94/0x130 [ 1017.120338][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1017.120356][ C1] ? _raw_spin_unlock+0x40/0x40 [ 1017.120374][ C1] folio_end_writeback+0x179/0x6f0 [ 1017.120414][ C1] ext4_finish_bio+0x739/0xb30 [ 1017.120437][ C1] ext4_release_io_end+0xdf/0x2c0 [ 1017.120451][ C1] ? ext4_convert_unwritten_io_end_vec+0x151/0x170 [ 1017.120489][ C1] ext4_end_io_rsv_work+0x5d6/0x6e0 [ 1017.120508][ C1] ? print_irqtrace_events+0x210/0x210 [ 1017.120527][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1017.120545][ C1] ? ext4_last_io_end_vec+0x70/0x70 [ 1017.120570][ C1] ? process_one_work+0x7a9/0x11d0 [ 1017.120586][ C1] process_one_work+0x8a9/0x11d0 [ 1017.120609][ C1] ? worker_detach_from_pool+0x260/0x260 [ 1017.120627][ C1] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1017.120644][ C1] ? kthread_data+0x4e/0xc0 [ 1017.120666][ C1] ? wq_worker_running+0x97/0x190 [ 1017.120689][ C1] worker_thread+0xa47/0x1200 [ 1017.120706][ C1] ? _raw_spin_unlock+0x40/0x40 [ 1017.120722][ C1] ? release_firmware_map_entry+0x185/0x185 [ 1017.120746][ C1] ? _raw_spin_unlock+0x40/0x40 [ 1017.120769][ C1] kthread+0x28d/0x320 [ 1017.120788][ C1] ? worker_clr_flags+0x190/0x190 [ 1017.120803][ C1] ? kthread_blkcg+0xd0/0xd0 [ 1017.120825][ C1] ret_from_fork+0x1f/0x30 [ 1017.120850][ C1] [ 1017.651021][ T28] Kernel panic - not syncing: hung_task: blocked tasks [ 1017.657904][ T28] CPU: 0 PID: 28 Comm: khungtaskd Not tainted 6.1.75-syzkaller #0 [ 1017.665719][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1017.675868][ T28] Call Trace: [ 1017.679153][ T28] [ 1017.682090][ T28] dump_stack_lvl+0x1e3/0x2cb [ 1017.686785][ T28] ? nf_tcp_handle_invalid+0x642/0x642 [ 1017.692264][ T28] ? panic+0x75d/0x75d [ 1017.696344][ T28] ? llist_add_batch+0x160/0x1d0 [ 1017.701301][ T28] ? vscnprintf+0x59/0x80 [ 1017.705643][ T28] panic+0x318/0x75d [ 1017.709554][ T28] ? nmi_trigger_cpumask_backtrace+0x2c1/0x3f0 [ 1017.715723][ T28] ? memcpy_page_flushcache+0xfc/0xfc [ 1017.721118][ T28] ? nmi_trigger_cpumask_backtrace+0x2c1/0x3f0 [ 1017.727294][ T28] ? nmi_trigger_cpumask_backtrace+0x33a/0x3f0 [ 1017.733466][ T28] ? nmi_trigger_cpumask_backtrace+0x33f/0x3f0 [ 1017.739639][ T28] watchdog+0xfc7/0xfd0 [ 1017.743817][ T28] ? watchdog+0x1f8/0xfd0 [ 1017.748161][ T28] kthread+0x28d/0x320 [ 1017.752248][ T28] ? hungtask_pm_notify+0x50/0x50 [ 1017.757281][ T28] ? kthread_blkcg+0xd0/0xd0 [ 1017.761887][ T28] ret_from_fork+0x1f/0x30 [ 1017.766330][ T28] [ 1017.769538][ T28] Kernel Offset: disabled [ 1017.773850][ T28] Rebooting in 86400 seconds..